Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 22:33

General

  • Target

    dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3.exe

  • Size

    236KB

  • MD5

    49c178735198c595f7d0703357d3bc67

  • SHA1

    e890993ab06257bc681d30e7a011b2093fed67e7

  • SHA256

    dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3

  • SHA512

    86d5013acbe5b53203844dd5dc4d9fdfd845f0925731a669ef4176a6bf9c5f559f927e61be4a48ac359f9620c898b4cef1f3027d21260bb1de5ad80441bddae9

  • SSDEEP

    6144:bRiRAjjLPqKGaLCUI989H79t5LqRPqTmc4t2GXh+juOTXFo:diRAjjLPqKGaLCUI989H79t4lqV4tejU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3.exe
    "C:\Users\Admin\AppData\Local\Temp\dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\faumuw.exe
      "C:\Users\Admin\faumuw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\faumuw.exe

    Filesize

    236KB

    MD5

    2e6ccf82db70d943eea832cbf23f6ff8

    SHA1

    074d290257b40bd8fa110c2dae640e9d4eb24f21

    SHA256

    6b0c340c5e881d3a88ea7e8449c98e18a2a3c015254ce6efe033ef32c99b177f

    SHA512

    5f0fb8801e936aac27a6ea45cb2c59ffddcfdd3734b5c8f9edfcb1b14f66f119ab3286bb145a67097f7f2914a392b3fbc5cd230e18ab8a0a1cc831430a246ded

  • C:\Users\Admin\faumuw.exe

    Filesize

    236KB

    MD5

    2e6ccf82db70d943eea832cbf23f6ff8

    SHA1

    074d290257b40bd8fa110c2dae640e9d4eb24f21

    SHA256

    6b0c340c5e881d3a88ea7e8449c98e18a2a3c015254ce6efe033ef32c99b177f

    SHA512

    5f0fb8801e936aac27a6ea45cb2c59ffddcfdd3734b5c8f9edfcb1b14f66f119ab3286bb145a67097f7f2914a392b3fbc5cd230e18ab8a0a1cc831430a246ded

  • \Users\Admin\faumuw.exe

    Filesize

    236KB

    MD5

    2e6ccf82db70d943eea832cbf23f6ff8

    SHA1

    074d290257b40bd8fa110c2dae640e9d4eb24f21

    SHA256

    6b0c340c5e881d3a88ea7e8449c98e18a2a3c015254ce6efe033ef32c99b177f

    SHA512

    5f0fb8801e936aac27a6ea45cb2c59ffddcfdd3734b5c8f9edfcb1b14f66f119ab3286bb145a67097f7f2914a392b3fbc5cd230e18ab8a0a1cc831430a246ded

  • \Users\Admin\faumuw.exe

    Filesize

    236KB

    MD5

    2e6ccf82db70d943eea832cbf23f6ff8

    SHA1

    074d290257b40bd8fa110c2dae640e9d4eb24f21

    SHA256

    6b0c340c5e881d3a88ea7e8449c98e18a2a3c015254ce6efe033ef32c99b177f

    SHA512

    5f0fb8801e936aac27a6ea45cb2c59ffddcfdd3734b5c8f9edfcb1b14f66f119ab3286bb145a67097f7f2914a392b3fbc5cd230e18ab8a0a1cc831430a246ded

  • memory/2044-56-0x00000000767F1000-0x00000000767F3000-memory.dmp

    Filesize

    8KB