Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    171s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:07

General

  • Target

    929dce67c7f7acaa5877a44ac5a75c6ff5b39604f8af81bd5119bfd7226977cb.exe

  • Size

    196KB

  • MD5

    cf333b8ae4ef6262cc150c464ff061f9

  • SHA1

    83dd3c58ca53bf4cef9b3a08a341d0d166de27e1

  • SHA256

    929dce67c7f7acaa5877a44ac5a75c6ff5b39604f8af81bd5119bfd7226977cb

  • SHA512

    aa5feaa92ab7a896d35646cc535136c1c4dfcb2bae3f5c17263be78eef6582fd354ff30e71f98019e090eb7c9e56fa2d7210ca4be735dca773361518a696df4c

  • SSDEEP

    3072:+y1DAg8t0tQ9nLHbB9WmvA7vejJWKvE+KmyJ:zu4QxL7B9WjjejJW5P

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\929dce67c7f7acaa5877a44ac5a75c6ff5b39604f8af81bd5119bfd7226977cb.exe
    "C:\Users\Admin\AppData\Local\Temp\929dce67c7f7acaa5877a44ac5a75c6ff5b39604f8af81bd5119bfd7226977cb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\wunis.exe
      "C:\Users\Admin\wunis.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wunis.exe

    Filesize

    196KB

    MD5

    afa7f0f9c2e9274ae3756545dc06d7ed

    SHA1

    bc97afdb76cbb760d39e1db36833a7ff36b770a5

    SHA256

    29db56fa5ce5b5991164677168ee4f77806f27802cf7bb7a5131281cc8b28e35

    SHA512

    c15ef0e636b12c2a7e2e3269238f989d54e39bde620888a131baa6eec645db6ab51168305ccb843a95b576ed91f8d20b41deba1385caacdf07b897ee5d96c7e5

  • C:\Users\Admin\wunis.exe

    Filesize

    196KB

    MD5

    afa7f0f9c2e9274ae3756545dc06d7ed

    SHA1

    bc97afdb76cbb760d39e1db36833a7ff36b770a5

    SHA256

    29db56fa5ce5b5991164677168ee4f77806f27802cf7bb7a5131281cc8b28e35

    SHA512

    c15ef0e636b12c2a7e2e3269238f989d54e39bde620888a131baa6eec645db6ab51168305ccb843a95b576ed91f8d20b41deba1385caacdf07b897ee5d96c7e5

  • \Users\Admin\wunis.exe

    Filesize

    196KB

    MD5

    afa7f0f9c2e9274ae3756545dc06d7ed

    SHA1

    bc97afdb76cbb760d39e1db36833a7ff36b770a5

    SHA256

    29db56fa5ce5b5991164677168ee4f77806f27802cf7bb7a5131281cc8b28e35

    SHA512

    c15ef0e636b12c2a7e2e3269238f989d54e39bde620888a131baa6eec645db6ab51168305ccb843a95b576ed91f8d20b41deba1385caacdf07b897ee5d96c7e5

  • \Users\Admin\wunis.exe

    Filesize

    196KB

    MD5

    afa7f0f9c2e9274ae3756545dc06d7ed

    SHA1

    bc97afdb76cbb760d39e1db36833a7ff36b770a5

    SHA256

    29db56fa5ce5b5991164677168ee4f77806f27802cf7bb7a5131281cc8b28e35

    SHA512

    c15ef0e636b12c2a7e2e3269238f989d54e39bde620888a131baa6eec645db6ab51168305ccb843a95b576ed91f8d20b41deba1385caacdf07b897ee5d96c7e5

  • memory/1772-56-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB