Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    158s
  • max time network
    87s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:08

General

  • Target

    8df9174eec0a3f70d928d3d5f4ec9559641f62213007612f7cf42aac1eb10a13.exe

  • Size

    60KB

  • MD5

    66975c0feaf787622aa65cf739487397

  • SHA1

    6563acfba1ded6d676828270b6f3bb2a4f849ff9

  • SHA256

    8df9174eec0a3f70d928d3d5f4ec9559641f62213007612f7cf42aac1eb10a13

  • SHA512

    ed1d94a182e214df7260220dd437233abb8eb6f48d80eefaf2e92b87e47c1b23e0afcf344871a3eeb51a6871f2f59cd53c63315311ad78cafa48dc53bc8c60a9

  • SSDEEP

    768:EQmfh+S+ZtTIZb05Lm3dSUMUWMUX2TtFIkNcSFIkid+69KOeM1gYn6cg4gspB6Wl:wh+S+nZKkQ1WlkSeTZNMmJ0Cw5u

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8df9174eec0a3f70d928d3d5f4ec9559641f62213007612f7cf42aac1eb10a13.exe
    "C:\Users\Admin\AppData\Local\Temp\8df9174eec0a3f70d928d3d5f4ec9559641f62213007612f7cf42aac1eb10a13.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\leuakeb.exe
      "C:\Users\Admin\leuakeb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\leuakeb.exe

    Filesize

    60KB

    MD5

    d22ac8a6c7657a7fbcbf11700a6e70da

    SHA1

    c6c6d32898a7094857490d29215ea59b5b24d260

    SHA256

    5a05f17915528c81eff2d77db7ffb766721ec8ec08db8f49c70fad18486963b5

    SHA512

    dc46256fa2ef746a0a9ba52bf66ca4f6b1df83d4dffd3317ac3567f6a1f18c0358aa3d87d15ddec0186aebd85a4b6c3bd3c33fb4a7639ac17d7c935b7a87f6b7

  • C:\Users\Admin\leuakeb.exe

    Filesize

    60KB

    MD5

    d22ac8a6c7657a7fbcbf11700a6e70da

    SHA1

    c6c6d32898a7094857490d29215ea59b5b24d260

    SHA256

    5a05f17915528c81eff2d77db7ffb766721ec8ec08db8f49c70fad18486963b5

    SHA512

    dc46256fa2ef746a0a9ba52bf66ca4f6b1df83d4dffd3317ac3567f6a1f18c0358aa3d87d15ddec0186aebd85a4b6c3bd3c33fb4a7639ac17d7c935b7a87f6b7

  • \Users\Admin\leuakeb.exe

    Filesize

    60KB

    MD5

    d22ac8a6c7657a7fbcbf11700a6e70da

    SHA1

    c6c6d32898a7094857490d29215ea59b5b24d260

    SHA256

    5a05f17915528c81eff2d77db7ffb766721ec8ec08db8f49c70fad18486963b5

    SHA512

    dc46256fa2ef746a0a9ba52bf66ca4f6b1df83d4dffd3317ac3567f6a1f18c0358aa3d87d15ddec0186aebd85a4b6c3bd3c33fb4a7639ac17d7c935b7a87f6b7

  • \Users\Admin\leuakeb.exe

    Filesize

    60KB

    MD5

    d22ac8a6c7657a7fbcbf11700a6e70da

    SHA1

    c6c6d32898a7094857490d29215ea59b5b24d260

    SHA256

    5a05f17915528c81eff2d77db7ffb766721ec8ec08db8f49c70fad18486963b5

    SHA512

    dc46256fa2ef746a0a9ba52bf66ca4f6b1df83d4dffd3317ac3567f6a1f18c0358aa3d87d15ddec0186aebd85a4b6c3bd3c33fb4a7639ac17d7c935b7a87f6b7

  • memory/1724-56-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB