Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 06:25
Behavioral task
behavioral1
Sample
2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe
Resource
win10v2004-20220812-en
General
-
Target
2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe
-
Size
216KB
-
MD5
1abd4046c4581e18a04f31fd01c37bc6
-
SHA1
e3a05f10b52399184714a01a5e3e29696d4345d5
-
SHA256
2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b
-
SHA512
ad947e946607fdba605344445d20528e49fbc343a5fef865e96b8af85f917ac7ff5639f44271e6c9b87ad3cdbeba372289426f4a812ed8ce35f26701292da005
-
SSDEEP
6144:RbRZe1dUZiD78HUynURW5wT5RnR/0ktNJ:XZliD6dnZe9R/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1724 LocalFYZYoSHdoF.exe 1876 Trojan.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 LocalFYZYoSHdoF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1724 2028 2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe 28 PID 2028 wrote to memory of 1724 2028 2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe 28 PID 2028 wrote to memory of 1724 2028 2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe 28 PID 2028 wrote to memory of 1724 2028 2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe 28 PID 1724 wrote to memory of 1876 1724 LocalFYZYoSHdoF.exe 30 PID 1724 wrote to memory of 1876 1724 LocalFYZYoSHdoF.exe 30 PID 1724 wrote to memory of 1876 1724 LocalFYZYoSHdoF.exe 30 PID 1724 wrote to memory of 1876 1724 LocalFYZYoSHdoF.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe"C:\Users\Admin\AppData\Local\Temp\2c694cd1fa99b5d049ef82a9fa176bcfa3658ee4e8fd427668667850d9f9bd3b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\LocalFYZYoSHdoF.exe"C:\Users\Admin\AppData\LocalFYZYoSHdoF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"3⤵
- Executes dropped EXE
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD582cd661b57ea77c2a70820c3fb85774a
SHA1ecc075d50770fce1c484e1b39cb1d69c8524fc94
SHA256d65bf887f167f882a21e0c6d5c82883830ab4301c63a6349968c6dcf0ede6276
SHA5127d9a07461378ac7705323911af79824171c2250190b2dded9078d56aa5ef96a391e21d43698bcab852995ab7161fb1185292c702f4f816fb991bbb72db8ad26d
-
Filesize
28KB
MD582cd661b57ea77c2a70820c3fb85774a
SHA1ecc075d50770fce1c484e1b39cb1d69c8524fc94
SHA256d65bf887f167f882a21e0c6d5c82883830ab4301c63a6349968c6dcf0ede6276
SHA5127d9a07461378ac7705323911af79824171c2250190b2dded9078d56aa5ef96a391e21d43698bcab852995ab7161fb1185292c702f4f816fb991bbb72db8ad26d
-
Filesize
28KB
MD582cd661b57ea77c2a70820c3fb85774a
SHA1ecc075d50770fce1c484e1b39cb1d69c8524fc94
SHA256d65bf887f167f882a21e0c6d5c82883830ab4301c63a6349968c6dcf0ede6276
SHA5127d9a07461378ac7705323911af79824171c2250190b2dded9078d56aa5ef96a391e21d43698bcab852995ab7161fb1185292c702f4f816fb991bbb72db8ad26d
-
Filesize
28KB
MD582cd661b57ea77c2a70820c3fb85774a
SHA1ecc075d50770fce1c484e1b39cb1d69c8524fc94
SHA256d65bf887f167f882a21e0c6d5c82883830ab4301c63a6349968c6dcf0ede6276
SHA5127d9a07461378ac7705323911af79824171c2250190b2dded9078d56aa5ef96a391e21d43698bcab852995ab7161fb1185292c702f4f816fb991bbb72db8ad26d
-
Filesize
28KB
MD582cd661b57ea77c2a70820c3fb85774a
SHA1ecc075d50770fce1c484e1b39cb1d69c8524fc94
SHA256d65bf887f167f882a21e0c6d5c82883830ab4301c63a6349968c6dcf0ede6276
SHA5127d9a07461378ac7705323911af79824171c2250190b2dded9078d56aa5ef96a391e21d43698bcab852995ab7161fb1185292c702f4f816fb991bbb72db8ad26d