Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 14:36

General

  • Target

    b2d05e58073e088f181baa61fc942c16ef211489d3aaa264426694e0df8d59d9.exe

  • Size

    1.3MB

  • MD5

    b38588a602da8a39add4afefd91395ce

  • SHA1

    b4e21251343717dba9b271aceaefcb2f5f2188da

  • SHA256

    b2d05e58073e088f181baa61fc942c16ef211489d3aaa264426694e0df8d59d9

  • SHA512

    621b00b447b29ae009eaedc3c3d268cf4e82770baa6f8347656b6f7dc2cca4b97bcbfa06f2c1873bc713b1a45a7ae8f12bb348673ac1dedd3d438c5cef16e960

  • SSDEEP

    24576:KaHMv6Corjqny/Q543dhZkDe0Jq34cRLUFLNGMVyH2ah6:K1vqjd/Q583gRgIcNUFsMyHY

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2d05e58073e088f181baa61fc942c16ef211489d3aaa264426694e0df8d59d9.exe
    "C:\Users\Admin\AppData\Local\Temp\b2d05e58073e088f181baa61fc942c16ef211489d3aaa264426694e0df8d59d9.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\b2d05e58073e088f181baa61fc942c16ef211489d3aaa264426694e0df8d59d9.exe
      "C:\Users\Admin\AppData\Local\Temp\b2d05e58073e088f181baa61fc942c16ef211489d3aaa264426694e0df8d59d9.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 144
        3⤵
        • Program crash
        PID:1812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1272-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/1328-55-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1328-58-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1328-56-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1328-61-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1328-63-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB