Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    77s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 05:11

General

  • Target

    53fed897bcb0b8f1b42f3b92f0eb4374ec3f3d53467ad4c3a94acd7393314fcc.exe

  • Size

    197KB

  • MD5

    32f6ce0c8b7e931112bcf4b28c91e770

  • SHA1

    7aa57948874eaac0f12adbb6c90496dfb7661299

  • SHA256

    53fed897bcb0b8f1b42f3b92f0eb4374ec3f3d53467ad4c3a94acd7393314fcc

  • SHA512

    dbda614dafb36d6f3b7eaafc7e71df57cc52141af4b26d5e7b03070997041ce3cda172ece139b36ff2dacfbdc86e15d1e1aee88b2ada4730e0fc14db5124a294

  • SSDEEP

    3072:UgXdZt9P6D3XJHMB0182vQ+3Y69Bjfjp+RqOlOpzbtvehpM0ZluqLcLe5xPrNoC3:Ue34aB0HXj9+RqOIpzAM0ZFKMyCxUeUG

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53fed897bcb0b8f1b42f3b92f0eb4374ec3f3d53467ad4c3a94acd7393314fcc.exe
    "C:\Users\Admin\AppData\Local\Temp\53fed897bcb0b8f1b42f3b92f0eb4374ec3f3d53467ad4c3a94acd7393314fcc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Google\HiGRDP_CRW.dll,GRDPlugInProc
      2⤵
      • Deletes itself
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\HiGRDP_CRW.dll

    Filesize

    488KB

    MD5

    e416ab13fd6ed47316cc2e4b396e065e

    SHA1

    351c527559fa6b936935edc3e208a407f8d0b301

    SHA256

    e4dcf12ffb74c4ce00fce7d5a805fcea725945983f3f4b58a4fb93c39f0b5a05

    SHA512

    c29990800547e3c263db1937338c8ab5a65129f9eb99f956ad7dc2e6039f1f6139bf5912f1edb40501390b4e80040dd12fca2bc53b17776743d6f06a0498570e

  • \Users\Admin\AppData\Local\Temp\nsoD54B.tmp\txwsatcr.dll

    Filesize

    488KB

    MD5

    e416ab13fd6ed47316cc2e4b396e065e

    SHA1

    351c527559fa6b936935edc3e208a407f8d0b301

    SHA256

    e4dcf12ffb74c4ce00fce7d5a805fcea725945983f3f4b58a4fb93c39f0b5a05

    SHA512

    c29990800547e3c263db1937338c8ab5a65129f9eb99f956ad7dc2e6039f1f6139bf5912f1edb40501390b4e80040dd12fca2bc53b17776743d6f06a0498570e

  • \Users\Admin\AppData\Local\Temp\nsoD54C.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • memory/1360-54-0x00000000766F1000-0x00000000766F3000-memory.dmp

    Filesize

    8KB

  • memory/1360-57-0x0000000000440000-0x00000000004BB000-memory.dmp

    Filesize

    492KB

  • memory/1360-58-0x0000000074500000-0x000000007457B000-memory.dmp

    Filesize

    492KB

  • memory/1360-64-0x0000000000440000-0x00000000004BB000-memory.dmp

    Filesize

    492KB

  • memory/2036-67-0x0000000010000000-0x000000001007B000-memory.dmp

    Filesize

    492KB