Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:26

General

  • Target

    6125bd4c2b73c5f367de3ed7748dbbe5b178316c0106d9ee2431c65de053960d.exe

  • Size

    218KB

  • MD5

    35f7d8fab7f9122b6990b2972c63a6c7

  • SHA1

    4fc7713c4c370ff0bdaa79614138b754859bca5a

  • SHA256

    6125bd4c2b73c5f367de3ed7748dbbe5b178316c0106d9ee2431c65de053960d

  • SHA512

    7ccb7976cda96394ca3102e596319b93c9a881e1447d52aa0c2ae61dd048a1be30ee5da0a1548bbc61a6c5a20986f4d7016c8dd2d489751ec46a0d9a5c5ee3aa

  • SSDEEP

    3072:SpRFOXcNXzMWAKl8HCZ5eqq1d0mG1yGTtS8U2wtSByxybzWRVOO5/WgjE00kaA20:SpRK2jR8ij9gd07XSZUvyJjE0CA2j

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6125bd4c2b73c5f367de3ed7748dbbe5b178316c0106d9ee2431c65de053960d.exe
    "C:\Users\Admin\AppData\Local\Temp\6125bd4c2b73c5f367de3ed7748dbbe5b178316c0106d9ee2431c65de053960d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Asset_Declaration_Form.pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1168
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      PID:556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Asset_Declaration_Form.pdf

    Filesize

    42KB

    MD5

    2843d1e5892f3a21677141d4b6ba7e6e

    SHA1

    6552e4e7e70f198b5f5e1d08100bfb44c41f0ebb

    SHA256

    bd7bc9292943d483317410913bb0acca1d1e2476161458abbfacae0950823529

    SHA512

    65b9b516a5399aa3141c2b11cb5217db9d0b7570b15c2ed93760bd6bb994d77899f36a8322040b16072c72f82e9d2fe1e437406f692dc57be07588aad1aa0e09

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    1.1MB

    MD5

    34aa912defa18c2c129f1e09d75c1d7e

    SHA1

    9c3046324657505a30ecd9b1fdb46c05bde7d470

    SHA256

    6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

    SHA512

    d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    1.1MB

    MD5

    34aa912defa18c2c129f1e09d75c1d7e

    SHA1

    9c3046324657505a30ecd9b1fdb46c05bde7d470

    SHA256

    6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

    SHA512

    d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

  • \Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    1.1MB

    MD5

    34aa912defa18c2c129f1e09d75c1d7e

    SHA1

    9c3046324657505a30ecd9b1fdb46c05bde7d470

    SHA256

    6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

    SHA512

    d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

  • memory/556-62-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/556-60-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/556-64-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/556-63-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/556-59-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/556-71-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1680-54-0x0000000074D81000-0x0000000074D83000-memory.dmp

    Filesize

    8KB

  • memory/1680-69-0x00000000742A0000-0x000000007484B000-memory.dmp

    Filesize

    5.7MB

  • memory/1680-57-0x00000000742A0000-0x000000007484B000-memory.dmp

    Filesize

    5.7MB