Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe
Resource
win10v2004-20221111-en
General
-
Target
a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe
-
Size
924KB
-
MD5
32773e7b7b63ed06db0f45388e860723
-
SHA1
f6dfd607be4e41deda9751294ff0095ce5094ce0
-
SHA256
a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b
-
SHA512
8f267776d0cf77704ca2110ca0f0b86b72d1e121ae9116ee6db4fb1b61338120be96bc1db6f21d1e99f5e562c65f9714ca6568bc46c1519b9f8f82c3cd229b32
-
SSDEEP
24576:x+xyXMK/7zMJ+NnzwlcRMlvHrzLePhyfKPHgJ:4STzMJ4wlnlTz6PhyfK4J
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1540 Xbox 360 1 Generator.exe 1640 svchost.exe 1836 Xbox 360 1 Generator.exe 1704 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 1364 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 1364 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 1640 svchost.exe 1640 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\E: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1312 set thread context of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1640 set thread context of 1704 1640 svchost.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 1540 Xbox 360 1 Generator.exe 1640 svchost.exe 1836 Xbox 360 1 Generator.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1540 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 27 PID 1312 wrote to memory of 1540 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 27 PID 1312 wrote to memory of 1540 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 27 PID 1312 wrote to memory of 1540 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 27 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1312 wrote to memory of 1364 1312 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 28 PID 1364 wrote to memory of 1640 1364 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 29 PID 1364 wrote to memory of 1640 1364 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 29 PID 1364 wrote to memory of 1640 1364 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 29 PID 1364 wrote to memory of 1640 1364 a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe 29 PID 1640 wrote to memory of 1836 1640 svchost.exe 30 PID 1640 wrote to memory of 1836 1640 svchost.exe 30 PID 1640 wrote to memory of 1836 1640 svchost.exe 30 PID 1640 wrote to memory of 1836 1640 svchost.exe 30 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31 PID 1640 wrote to memory of 1704 1640 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe"C:\Users\Admin\AppData\Local\Temp\a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Xbox 360 1 Generator.exe"C:\Users\Admin\AppData\Local\Temp\Xbox 360 1 Generator.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exeC:\Users\Admin\AppData\Local\Temp\a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b.exe ""2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Xbox 360 1 Generator.exe"C:\Users\Admin\AppData\Local\Temp\Xbox 360 1 Generator.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe ""4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1704
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD54fb928be9763d8ec07b5640b106004c8
SHA1ce50259733c4133adcb179213809d22593af9ceb
SHA2564837b08c1a07db4a2acff556b962a5a427e3925879857739709f7f36481cddc9
SHA512ed2a6dc12cae4f6d032be89908bc616315608e43843c3942cf0e449039e2d6960f8adfe0a40e0c21d7cb0cf9fd6fa9c5d9e9543927ea73f47d6e0392bc75c9b6
-
Filesize
400KB
MD54fb928be9763d8ec07b5640b106004c8
SHA1ce50259733c4133adcb179213809d22593af9ceb
SHA2564837b08c1a07db4a2acff556b962a5a427e3925879857739709f7f36481cddc9
SHA512ed2a6dc12cae4f6d032be89908bc616315608e43843c3942cf0e449039e2d6960f8adfe0a40e0c21d7cb0cf9fd6fa9c5d9e9543927ea73f47d6e0392bc75c9b6
-
Filesize
400KB
MD54fb928be9763d8ec07b5640b106004c8
SHA1ce50259733c4133adcb179213809d22593af9ceb
SHA2564837b08c1a07db4a2acff556b962a5a427e3925879857739709f7f36481cddc9
SHA512ed2a6dc12cae4f6d032be89908bc616315608e43843c3942cf0e449039e2d6960f8adfe0a40e0c21d7cb0cf9fd6fa9c5d9e9543927ea73f47d6e0392bc75c9b6
-
Filesize
924KB
MD532773e7b7b63ed06db0f45388e860723
SHA1f6dfd607be4e41deda9751294ff0095ce5094ce0
SHA256a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b
SHA5128f267776d0cf77704ca2110ca0f0b86b72d1e121ae9116ee6db4fb1b61338120be96bc1db6f21d1e99f5e562c65f9714ca6568bc46c1519b9f8f82c3cd229b32
-
Filesize
924KB
MD532773e7b7b63ed06db0f45388e860723
SHA1f6dfd607be4e41deda9751294ff0095ce5094ce0
SHA256a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b
SHA5128f267776d0cf77704ca2110ca0f0b86b72d1e121ae9116ee6db4fb1b61338120be96bc1db6f21d1e99f5e562c65f9714ca6568bc46c1519b9f8f82c3cd229b32
-
Filesize
924KB
MD532773e7b7b63ed06db0f45388e860723
SHA1f6dfd607be4e41deda9751294ff0095ce5094ce0
SHA256a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b
SHA5128f267776d0cf77704ca2110ca0f0b86b72d1e121ae9116ee6db4fb1b61338120be96bc1db6f21d1e99f5e562c65f9714ca6568bc46c1519b9f8f82c3cd229b32
-
Filesize
400KB
MD54fb928be9763d8ec07b5640b106004c8
SHA1ce50259733c4133adcb179213809d22593af9ceb
SHA2564837b08c1a07db4a2acff556b962a5a427e3925879857739709f7f36481cddc9
SHA512ed2a6dc12cae4f6d032be89908bc616315608e43843c3942cf0e449039e2d6960f8adfe0a40e0c21d7cb0cf9fd6fa9c5d9e9543927ea73f47d6e0392bc75c9b6
-
Filesize
400KB
MD54fb928be9763d8ec07b5640b106004c8
SHA1ce50259733c4133adcb179213809d22593af9ceb
SHA2564837b08c1a07db4a2acff556b962a5a427e3925879857739709f7f36481cddc9
SHA512ed2a6dc12cae4f6d032be89908bc616315608e43843c3942cf0e449039e2d6960f8adfe0a40e0c21d7cb0cf9fd6fa9c5d9e9543927ea73f47d6e0392bc75c9b6
-
Filesize
400KB
MD54fb928be9763d8ec07b5640b106004c8
SHA1ce50259733c4133adcb179213809d22593af9ceb
SHA2564837b08c1a07db4a2acff556b962a5a427e3925879857739709f7f36481cddc9
SHA512ed2a6dc12cae4f6d032be89908bc616315608e43843c3942cf0e449039e2d6960f8adfe0a40e0c21d7cb0cf9fd6fa9c5d9e9543927ea73f47d6e0392bc75c9b6
-
Filesize
400KB
MD54fb928be9763d8ec07b5640b106004c8
SHA1ce50259733c4133adcb179213809d22593af9ceb
SHA2564837b08c1a07db4a2acff556b962a5a427e3925879857739709f7f36481cddc9
SHA512ed2a6dc12cae4f6d032be89908bc616315608e43843c3942cf0e449039e2d6960f8adfe0a40e0c21d7cb0cf9fd6fa9c5d9e9543927ea73f47d6e0392bc75c9b6
-
Filesize
924KB
MD532773e7b7b63ed06db0f45388e860723
SHA1f6dfd607be4e41deda9751294ff0095ce5094ce0
SHA256a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b
SHA5128f267776d0cf77704ca2110ca0f0b86b72d1e121ae9116ee6db4fb1b61338120be96bc1db6f21d1e99f5e562c65f9714ca6568bc46c1519b9f8f82c3cd229b32
-
Filesize
924KB
MD532773e7b7b63ed06db0f45388e860723
SHA1f6dfd607be4e41deda9751294ff0095ce5094ce0
SHA256a0d777aca98a1d194a1fe771ed0c119e38412b5370cc7a8782587d371b823c4b
SHA5128f267776d0cf77704ca2110ca0f0b86b72d1e121ae9116ee6db4fb1b61338120be96bc1db6f21d1e99f5e562c65f9714ca6568bc46c1519b9f8f82c3cd229b32