Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe
Resource
win10v2004-20220812-en
General
-
Target
ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe
-
Size
489KB
-
MD5
052a2ea735701887331c568bcf2cdf85
-
SHA1
80cbc46a97b0eb58d0359a3761ed4d0741473a99
-
SHA256
ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010
-
SHA512
b8f184f0a80184c8cdcdb240b53e5eec3e7b012990f447d11f0c573d6199aa48a5291e0bdaa9c028b0d0eb986c6358e1f5045256d8df48bfcb6dafac39475690
-
SSDEEP
12288:BWQfhJ7kNO9EoUOPKD3ypHaWIjsDEDsj:B/J7kY9EoUpDipjED
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1744 befadegfdg_P.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe 2028 ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1320 wmic.exe Token: SeSecurityPrivilege 1320 wmic.exe Token: SeTakeOwnershipPrivilege 1320 wmic.exe Token: SeLoadDriverPrivilege 1320 wmic.exe Token: SeSystemProfilePrivilege 1320 wmic.exe Token: SeSystemtimePrivilege 1320 wmic.exe Token: SeProfSingleProcessPrivilege 1320 wmic.exe Token: SeIncBasePriorityPrivilege 1320 wmic.exe Token: SeCreatePagefilePrivilege 1320 wmic.exe Token: SeBackupPrivilege 1320 wmic.exe Token: SeRestorePrivilege 1320 wmic.exe Token: SeShutdownPrivilege 1320 wmic.exe Token: SeDebugPrivilege 1320 wmic.exe Token: SeSystemEnvironmentPrivilege 1320 wmic.exe Token: SeRemoteShutdownPrivilege 1320 wmic.exe Token: SeUndockPrivilege 1320 wmic.exe Token: SeManageVolumePrivilege 1320 wmic.exe Token: 33 1320 wmic.exe Token: 34 1320 wmic.exe Token: 35 1320 wmic.exe Token: SeIncreaseQuotaPrivilege 1320 wmic.exe Token: SeSecurityPrivilege 1320 wmic.exe Token: SeTakeOwnershipPrivilege 1320 wmic.exe Token: SeLoadDriverPrivilege 1320 wmic.exe Token: SeSystemProfilePrivilege 1320 wmic.exe Token: SeSystemtimePrivilege 1320 wmic.exe Token: SeProfSingleProcessPrivilege 1320 wmic.exe Token: SeIncBasePriorityPrivilege 1320 wmic.exe Token: SeCreatePagefilePrivilege 1320 wmic.exe Token: SeBackupPrivilege 1320 wmic.exe Token: SeRestorePrivilege 1320 wmic.exe Token: SeShutdownPrivilege 1320 wmic.exe Token: SeDebugPrivilege 1320 wmic.exe Token: SeSystemEnvironmentPrivilege 1320 wmic.exe Token: SeRemoteShutdownPrivilege 1320 wmic.exe Token: SeUndockPrivilege 1320 wmic.exe Token: SeManageVolumePrivilege 1320 wmic.exe Token: 33 1320 wmic.exe Token: 34 1320 wmic.exe Token: 35 1320 wmic.exe Token: SeIncreaseQuotaPrivilege 684 wmic.exe Token: SeSecurityPrivilege 684 wmic.exe Token: SeTakeOwnershipPrivilege 684 wmic.exe Token: SeLoadDriverPrivilege 684 wmic.exe Token: SeSystemProfilePrivilege 684 wmic.exe Token: SeSystemtimePrivilege 684 wmic.exe Token: SeProfSingleProcessPrivilege 684 wmic.exe Token: SeIncBasePriorityPrivilege 684 wmic.exe Token: SeCreatePagefilePrivilege 684 wmic.exe Token: SeBackupPrivilege 684 wmic.exe Token: SeRestorePrivilege 684 wmic.exe Token: SeShutdownPrivilege 684 wmic.exe Token: SeDebugPrivilege 684 wmic.exe Token: SeSystemEnvironmentPrivilege 684 wmic.exe Token: SeRemoteShutdownPrivilege 684 wmic.exe Token: SeUndockPrivilege 684 wmic.exe Token: SeManageVolumePrivilege 684 wmic.exe Token: 33 684 wmic.exe Token: 34 684 wmic.exe Token: 35 684 wmic.exe Token: SeIncreaseQuotaPrivilege 684 wmic.exe Token: SeSecurityPrivilege 684 wmic.exe Token: SeTakeOwnershipPrivilege 684 wmic.exe Token: SeLoadDriverPrivilege 684 wmic.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1744 2028 ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe 28 PID 2028 wrote to memory of 1744 2028 ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe 28 PID 2028 wrote to memory of 1744 2028 ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe 28 PID 2028 wrote to memory of 1744 2028 ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe 28 PID 1744 wrote to memory of 1320 1744 befadegfdg_P.exe 29 PID 1744 wrote to memory of 1320 1744 befadegfdg_P.exe 29 PID 1744 wrote to memory of 1320 1744 befadegfdg_P.exe 29 PID 1744 wrote to memory of 1320 1744 befadegfdg_P.exe 29 PID 1744 wrote to memory of 684 1744 befadegfdg_P.exe 32 PID 1744 wrote to memory of 684 1744 befadegfdg_P.exe 32 PID 1744 wrote to memory of 684 1744 befadegfdg_P.exe 32 PID 1744 wrote to memory of 684 1744 befadegfdg_P.exe 32 PID 1744 wrote to memory of 1804 1744 befadegfdg_P.exe 34 PID 1744 wrote to memory of 1804 1744 befadegfdg_P.exe 34 PID 1744 wrote to memory of 1804 1744 befadegfdg_P.exe 34 PID 1744 wrote to memory of 1804 1744 befadegfdg_P.exe 34 PID 1744 wrote to memory of 1068 1744 befadegfdg_P.exe 36 PID 1744 wrote to memory of 1068 1744 befadegfdg_P.exe 36 PID 1744 wrote to memory of 1068 1744 befadegfdg_P.exe 36 PID 1744 wrote to memory of 1068 1744 befadegfdg_P.exe 36 PID 1744 wrote to memory of 904 1744 befadegfdg_P.exe 38 PID 1744 wrote to memory of 904 1744 befadegfdg_P.exe 38 PID 1744 wrote to memory of 904 1744 befadegfdg_P.exe 38 PID 1744 wrote to memory of 904 1744 befadegfdg_P.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe"C:\Users\Admin\AppData\Local\Temp\ad89e4f1f4159106e27bcc3d028fec7a16d3f3417e0b9c67f99e63ae59414010.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\befadegfdg_P.exeC:\Users\Admin\AppData\Local\Temp\befadegfdg_P.exe 6]3]1]5]5]2]4]3]8]3]8 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2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669694072.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669694072.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669694072.txt bios get version3⤵PID:1804
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669694072.txt bios get version3⤵PID:1068
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669694072.txt bios get version3⤵PID:904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
674KB
MD593c3c1d0d5299bb9cefe9e9181a17070
SHA177a89de10714fd3862276d65ca4cb440628d81a4
SHA256fbe70131b58335fc221283fe76ee5ebeef38c677ab97a7a775ec1a8beb32aaa7
SHA5129e2871266f95a6f96fd92db2f37141f4a39b095922e1a6f482a73fbaaeb653464f4ff0e445ef3aec95e9b1f2437245ff68fd7bc1c5e5341c572b24a1e4ab0ce3
-
Filesize
674KB
MD593c3c1d0d5299bb9cefe9e9181a17070
SHA177a89de10714fd3862276d65ca4cb440628d81a4
SHA256fbe70131b58335fc221283fe76ee5ebeef38c677ab97a7a775ec1a8beb32aaa7
SHA5129e2871266f95a6f96fd92db2f37141f4a39b095922e1a6f482a73fbaaeb653464f4ff0e445ef3aec95e9b1f2437245ff68fd7bc1c5e5341c572b24a1e4ab0ce3
-
Filesize
674KB
MD593c3c1d0d5299bb9cefe9e9181a17070
SHA177a89de10714fd3862276d65ca4cb440628d81a4
SHA256fbe70131b58335fc221283fe76ee5ebeef38c677ab97a7a775ec1a8beb32aaa7
SHA5129e2871266f95a6f96fd92db2f37141f4a39b095922e1a6f482a73fbaaeb653464f4ff0e445ef3aec95e9b1f2437245ff68fd7bc1c5e5341c572b24a1e4ab0ce3