Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 17:11

General

  • Target

    b9ce8503fc41a11bf3da60d6de3b63a1c79a1309156aa8aa16673a100ae58ffb.exe

  • Size

    204KB

  • MD5

    17eb8f9b0687ca1c1a3f71024e071a99

  • SHA1

    43ec9d158b838bfc24c6ab6b0f956e40d5572130

  • SHA256

    b9ce8503fc41a11bf3da60d6de3b63a1c79a1309156aa8aa16673a100ae58ffb

  • SHA512

    d16f2dc6690b258b29baabe08d6ea34368ab37c28ca9982acc0fd26ab8b1da099de7b94c4746a5d8a5aa5d10e01382691f845f1690a6dcb3d1c3af103954ff45

  • SSDEEP

    1536:F6+OofHo1vzxHwxhZxNy3tQ9CW5EZWHakMwP9W6uXNh9h1AWa11GBPIdRONd+w67:rHo160tQ9nLHbB9WTk9+Jgqmlt5V

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9ce8503fc41a11bf3da60d6de3b63a1c79a1309156aa8aa16673a100ae58ffb.exe
    "C:\Users\Admin\AppData\Local\Temp\b9ce8503fc41a11bf3da60d6de3b63a1c79a1309156aa8aa16673a100ae58ffb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\sioibe.exe
      "C:\Users\Admin\sioibe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sioibe.exe

    Filesize

    204KB

    MD5

    f8d2e480aebc3df2194834d912feb55c

    SHA1

    76807ab2e7e0797aee2aad786b7cf81e37f67ce4

    SHA256

    1f1da98bf56199a04cde94eaf66a1f6b7e74ac99667b2e84db7fb0d5dccfe3a3

    SHA512

    b27c0d245c18f4c6c23b159221e3b5d10a91fc930a2e4fe003fec508b04def6b850901ac53b6fcd6950e7ae1588a6b31d9fe98ad5c856c631c0f78649ddfc9b5

  • C:\Users\Admin\sioibe.exe

    Filesize

    204KB

    MD5

    f8d2e480aebc3df2194834d912feb55c

    SHA1

    76807ab2e7e0797aee2aad786b7cf81e37f67ce4

    SHA256

    1f1da98bf56199a04cde94eaf66a1f6b7e74ac99667b2e84db7fb0d5dccfe3a3

    SHA512

    b27c0d245c18f4c6c23b159221e3b5d10a91fc930a2e4fe003fec508b04def6b850901ac53b6fcd6950e7ae1588a6b31d9fe98ad5c856c631c0f78649ddfc9b5

  • \Users\Admin\sioibe.exe

    Filesize

    204KB

    MD5

    f8d2e480aebc3df2194834d912feb55c

    SHA1

    76807ab2e7e0797aee2aad786b7cf81e37f67ce4

    SHA256

    1f1da98bf56199a04cde94eaf66a1f6b7e74ac99667b2e84db7fb0d5dccfe3a3

    SHA512

    b27c0d245c18f4c6c23b159221e3b5d10a91fc930a2e4fe003fec508b04def6b850901ac53b6fcd6950e7ae1588a6b31d9fe98ad5c856c631c0f78649ddfc9b5

  • \Users\Admin\sioibe.exe

    Filesize

    204KB

    MD5

    f8d2e480aebc3df2194834d912feb55c

    SHA1

    76807ab2e7e0797aee2aad786b7cf81e37f67ce4

    SHA256

    1f1da98bf56199a04cde94eaf66a1f6b7e74ac99667b2e84db7fb0d5dccfe3a3

    SHA512

    b27c0d245c18f4c6c23b159221e3b5d10a91fc930a2e4fe003fec508b04def6b850901ac53b6fcd6950e7ae1588a6b31d9fe98ad5c856c631c0f78649ddfc9b5

  • memory/1992-56-0x0000000076141000-0x0000000076143000-memory.dmp

    Filesize

    8KB