Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe
Resource
win10v2004-20220812-en
General
-
Target
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe
-
Size
288KB
-
MD5
df4ed8f2643ccde6e0ea3168fc970352
-
SHA1
d19ca55618f10f30782e9ad3d02db508d9a22f54
-
SHA256
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42
-
SHA512
f09c7e1ab0c8069c09c4e4df8cc8a6e5e5202fdf8020b3de9ec6a573030fbbc0b7d122c9d5c38367f40b836eda07c9dfdce3e361c9b90fdd68429fc1c390f3a6
-
SSDEEP
3072:Muu/BivfD+eQmQRnnYiXt5zy73xqGbN3S3LlXvja7Rm07FSx4hPvMmgNR:juZOfyHYiCnNsl7a045hPv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1120 Xjwd.exe -
Deletes itself 1 IoCs
pid Process 1188 cmd.exe -
Loads dropped DLL 7 IoCs
pid Process 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 1120 Xjwd.exe 804 WerFault.exe 804 WerFault.exe 804 WerFault.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\7106063\common\Utility.dll 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe File opened for modification C:\Program Files\7106063\common\RCX6F28.tmp 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe File created C:\Program Files\7106063\Xjwd.exe 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 804 1120 WerFault.exe 28 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 764 PING.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1120 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 28 PID 1228 wrote to memory of 1120 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 28 PID 1228 wrote to memory of 1120 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 28 PID 1228 wrote to memory of 1120 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 28 PID 1228 wrote to memory of 1188 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 29 PID 1228 wrote to memory of 1188 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 29 PID 1228 wrote to memory of 1188 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 29 PID 1228 wrote to memory of 1188 1228 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 29 PID 1188 wrote to memory of 764 1188 cmd.exe 31 PID 1188 wrote to memory of 764 1188 cmd.exe 31 PID 1188 wrote to memory of 764 1188 cmd.exe 31 PID 1188 wrote to memory of 764 1188 cmd.exe 31 PID 1120 wrote to memory of 804 1120 Xjwd.exe 33 PID 1120 wrote to memory of 804 1120 Xjwd.exe 33 PID 1120 wrote to memory of 804 1120 Xjwd.exe 33 PID 1120 wrote to memory of 804 1120 Xjwd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe"C:\Users\Admin\AppData\Local\Temp\98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files\7106063\Xjwd.exe"C:\Program Files\7106063\Xjwd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 6963⤵
- Loads dropped DLL
- Program crash
PID:804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81.1MB
MD5399831f74a20dcfae8220afd497b5dd9
SHA16d75ee3e22a107b21bb43d20f4f5490b61fae183
SHA256bcac821384c93c4236b5e6b282387e99a411930d7be9550ff5afab2feef7c7d6
SHA512a4862be3d37b564875f583944c40569a53df98a4217e72dec6a7a0cff7abdf282f98192bd923bf9ff7b8d3280374a6843095979a9bfedb774df515536e0addb2
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
81.1MB
MD5399831f74a20dcfae8220afd497b5dd9
SHA16d75ee3e22a107b21bb43d20f4f5490b61fae183
SHA256bcac821384c93c4236b5e6b282387e99a411930d7be9550ff5afab2feef7c7d6
SHA512a4862be3d37b564875f583944c40569a53df98a4217e72dec6a7a0cff7abdf282f98192bd923bf9ff7b8d3280374a6843095979a9bfedb774df515536e0addb2
-
Filesize
81.1MB
MD5399831f74a20dcfae8220afd497b5dd9
SHA16d75ee3e22a107b21bb43d20f4f5490b61fae183
SHA256bcac821384c93c4236b5e6b282387e99a411930d7be9550ff5afab2feef7c7d6
SHA512a4862be3d37b564875f583944c40569a53df98a4217e72dec6a7a0cff7abdf282f98192bd923bf9ff7b8d3280374a6843095979a9bfedb774df515536e0addb2