Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 16:54

General

  • Target

    e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a.exe

  • Size

    108KB

  • MD5

    91b3c57123c1058b91bc4b93261a3e47

  • SHA1

    c71d483852dcf3455c19c6bc3cc7d44ccaebadfb

  • SHA256

    e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a

  • SHA512

    f151a4111c8fe4bf322132aedea7183c0f8806a342c4e074ad306d6e05488a548c42eaf5602f927889b45fac9d4f98c0aae6de9c878416f24135edde36353f9b

  • SSDEEP

    1536:shycKiB6oQ7Lh5+sXmNt0ttiPXLq0zTrkB:ArmoIeZt1XTzToB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a.exe
    "C:\Users\Admin\AppData\Local\Temp\e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\lsvaez.exe
      "C:\Users\Admin\lsvaez.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lsvaez.exe

    Filesize

    108KB

    MD5

    7ec37e239579e3243588111c642ccf64

    SHA1

    b1a418f051b4f1df052daf745496051d73484d3a

    SHA256

    c709c41a9cb2f8ed600d3f3b2d549e16c31b6f06934eaa61b6f57df7cd57d2cc

    SHA512

    b06781796a2c2a3090a4ee68145836362798cc5ec9c14a53edf296b5274b97b5d6f3748a289c957c80d6326291b693239201384f9db245266722db293e5ed7d2

  • C:\Users\Admin\lsvaez.exe

    Filesize

    108KB

    MD5

    7ec37e239579e3243588111c642ccf64

    SHA1

    b1a418f051b4f1df052daf745496051d73484d3a

    SHA256

    c709c41a9cb2f8ed600d3f3b2d549e16c31b6f06934eaa61b6f57df7cd57d2cc

    SHA512

    b06781796a2c2a3090a4ee68145836362798cc5ec9c14a53edf296b5274b97b5d6f3748a289c957c80d6326291b693239201384f9db245266722db293e5ed7d2

  • \Users\Admin\lsvaez.exe

    Filesize

    108KB

    MD5

    7ec37e239579e3243588111c642ccf64

    SHA1

    b1a418f051b4f1df052daf745496051d73484d3a

    SHA256

    c709c41a9cb2f8ed600d3f3b2d549e16c31b6f06934eaa61b6f57df7cd57d2cc

    SHA512

    b06781796a2c2a3090a4ee68145836362798cc5ec9c14a53edf296b5274b97b5d6f3748a289c957c80d6326291b693239201384f9db245266722db293e5ed7d2

  • \Users\Admin\lsvaez.exe

    Filesize

    108KB

    MD5

    7ec37e239579e3243588111c642ccf64

    SHA1

    b1a418f051b4f1df052daf745496051d73484d3a

    SHA256

    c709c41a9cb2f8ed600d3f3b2d549e16c31b6f06934eaa61b6f57df7cd57d2cc

    SHA512

    b06781796a2c2a3090a4ee68145836362798cc5ec9c14a53edf296b5274b97b5d6f3748a289c957c80d6326291b693239201384f9db245266722db293e5ed7d2

  • memory/1632-56-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB