Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe
Resource
win10v2004-20221111-en
General
-
Target
4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe
-
Size
480KB
-
MD5
7a478a60432a2f6ba70d08f35316e281
-
SHA1
b6cf341f272c62643fc098c81f5bf29cb4b7dbc8
-
SHA256
4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc
-
SHA512
81553c0e54f420e137aadd472d8b15cc026d9db87726182591f090dcfe00d471a11881786b8e9173ae436877c14221637bcfd1d02f318a3b42fdc854abc2b250
-
SSDEEP
6144:x3iivPlrTo8JNYWfaWIjmyp+2z93DqvSG54AIH:UilJNYvLEE9WKAIH
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 240 netsh.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe Token: 33 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe Token: SeIncBasePriorityPrivilege 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1820 wrote to memory of 900 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 28 PID 1820 wrote to memory of 900 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 28 PID 1820 wrote to memory of 900 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 28 PID 1820 wrote to memory of 900 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 28 PID 1820 wrote to memory of 572 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 30 PID 1820 wrote to memory of 572 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 30 PID 1820 wrote to memory of 572 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 30 PID 1820 wrote to memory of 572 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 30 PID 1820 wrote to memory of 580 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 32 PID 1820 wrote to memory of 580 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 32 PID 1820 wrote to memory of 580 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 32 PID 1820 wrote to memory of 580 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 32 PID 900 wrote to memory of 1064 900 cmd.exe 33 PID 900 wrote to memory of 1064 900 cmd.exe 33 PID 900 wrote to memory of 1064 900 cmd.exe 33 PID 900 wrote to memory of 1064 900 cmd.exe 33 PID 1820 wrote to memory of 524 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 39 PID 1820 wrote to memory of 524 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 39 PID 1820 wrote to memory of 524 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 39 PID 1820 wrote to memory of 524 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 39 PID 572 wrote to memory of 2032 572 cmd.exe 38 PID 572 wrote to memory of 2032 572 cmd.exe 38 PID 572 wrote to memory of 2032 572 cmd.exe 38 PID 572 wrote to memory of 2032 572 cmd.exe 38 PID 1820 wrote to memory of 1776 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 37 PID 1820 wrote to memory of 1776 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 37 PID 1820 wrote to memory of 1776 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 37 PID 1820 wrote to memory of 1776 1820 4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe 37 PID 524 wrote to memory of 1672 524 cmd.exe 42 PID 524 wrote to memory of 1672 524 cmd.exe 42 PID 524 wrote to memory of 1672 524 cmd.exe 42 PID 524 wrote to memory of 1672 524 cmd.exe 42 PID 1776 wrote to memory of 1104 1776 cmd.exe 40 PID 1776 wrote to memory of 1104 1776 cmd.exe 40 PID 1776 wrote to memory of 1104 1776 cmd.exe 40 PID 1776 wrote to memory of 1104 1776 cmd.exe 40 PID 580 wrote to memory of 1108 580 cmd.exe 41 PID 580 wrote to memory of 1108 580 cmd.exe 41 PID 580 wrote to memory of 1108 580 cmd.exe 41 PID 580 wrote to memory of 1108 580 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe"C:\Users\Admin\AppData\Local\Temp\4af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe3⤵
- Adds Run key to start application
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe3⤵
- Adds Run key to start application
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe3⤵
- Adds Run key to start application
PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe3⤵
- Adds Run key to start application
PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe3⤵
- Adds Run key to start application
PID:1672
-
-
-
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵PID:560
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe3⤵PID:636
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Microsoft® Windows® Operating System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe4⤵PID:1732
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\explorer.exe" "explorer.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:240
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD57a478a60432a2f6ba70d08f35316e281
SHA1b6cf341f272c62643fc098c81f5bf29cb4b7dbc8
SHA2564af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc
SHA51281553c0e54f420e137aadd472d8b15cc026d9db87726182591f090dcfe00d471a11881786b8e9173ae436877c14221637bcfd1d02f318a3b42fdc854abc2b250
-
Filesize
480KB
MD57a478a60432a2f6ba70d08f35316e281
SHA1b6cf341f272c62643fc098c81f5bf29cb4b7dbc8
SHA2564af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc
SHA51281553c0e54f420e137aadd472d8b15cc026d9db87726182591f090dcfe00d471a11881786b8e9173ae436877c14221637bcfd1d02f318a3b42fdc854abc2b250
-
Filesize
480KB
MD57a478a60432a2f6ba70d08f35316e281
SHA1b6cf341f272c62643fc098c81f5bf29cb4b7dbc8
SHA2564af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc
SHA51281553c0e54f420e137aadd472d8b15cc026d9db87726182591f090dcfe00d471a11881786b8e9173ae436877c14221637bcfd1d02f318a3b42fdc854abc2b250
-
Filesize
480KB
MD57a478a60432a2f6ba70d08f35316e281
SHA1b6cf341f272c62643fc098c81f5bf29cb4b7dbc8
SHA2564af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc
SHA51281553c0e54f420e137aadd472d8b15cc026d9db87726182591f090dcfe00d471a11881786b8e9173ae436877c14221637bcfd1d02f318a3b42fdc854abc2b250
-
Filesize
480KB
MD57a478a60432a2f6ba70d08f35316e281
SHA1b6cf341f272c62643fc098c81f5bf29cb4b7dbc8
SHA2564af7c72253f706a407b2e7e476bc760a25f18cb644a4049b467257953165a5fc
SHA51281553c0e54f420e137aadd472d8b15cc026d9db87726182591f090dcfe00d471a11881786b8e9173ae436877c14221637bcfd1d02f318a3b42fdc854abc2b250