Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 06:34

General

  • Target

    ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a.exe

  • Size

    2.1MB

  • MD5

    ab59ba909a34ec973045dcad6e867276

  • SHA1

    dd538f5e0847a245a6b3256983aa3cf2677b137e

  • SHA256

    ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a

  • SHA512

    3206967d91933ef2b693df5d74c656162db2aeda139e32809743be39f94f52c5c4407a7f911b4df31c327059ef905cb811e3ad8ed62aea183acd71ab805f42ae

  • SSDEEP

    24576:hfAqOavfPNman8jarwLeXfB0yfM8GUS/heII8oyn6yKXbs1x3/rcpBpnuq9zq4Mq:hua82rNJKU0n8Xg1V/yrBXP

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a.exe
    "C:\Users\Admin\AppData\Local\Temp\ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im serviceupda.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im serviceupda.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:688
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im flashplayer.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im flashplayer.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:768
    • C:\Users\Admin\AppData\Local\Temp\flashplayer.exe
      "C:\Users\Admin\AppData\Local\Temp\flashplayer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://get.adobe.com/flashplayer/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:564
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
          PID:956
      • C:\Users\Admin\AppData\Local\Temp\serviceupda.exe
        "C:\Users\Admin\AppData\Local\Temp\serviceupda.exe"
        2⤵
        • Executes dropped EXE
        PID:1636

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      13KB

      MD5

      c6443ce9c01398e05e80b86916f98d5a

      SHA1

      fb4f41ec215fe12784c437b6fa4fa2dfcff504c5

      SHA256

      8e429c90b4310b94f311294525f5867af3b0c2db9b105defc19aa2a254d674ae

      SHA512

      20b537da46fb67d147a834d6bf88ff6c047e60c3fd90d6201d950c456fc4beb1c474743e9d098825d90894a9e788ce6508da39bb43765b9b6ab99325d8de93e5

    • C:\Users\Admin\AppData\Local\Temp\flashplayer.exe

      Filesize

      1.1MB

      MD5

      96c436d7e2b49f213a983cb3e648b04d

      SHA1

      84ad2263701b370caa15ec6142fa81b2db3342c2

      SHA256

      22225caeedc7e46ccc98af1c6622c626f4d75a93b6a9976a2eed11b429e59188

      SHA512

      095b62d0288a8be544a989f3949b7afe5415475e8acb379bfc9b31d74a0cecdee81433a84496853edc155cd96df9fe1c3524beaf3decc95b343aafc29ae6c8d8

    • C:\Users\Admin\AppData\Local\Temp\flashplayer.exe

      Filesize

      1.1MB

      MD5

      96c436d7e2b49f213a983cb3e648b04d

      SHA1

      84ad2263701b370caa15ec6142fa81b2db3342c2

      SHA256

      22225caeedc7e46ccc98af1c6622c626f4d75a93b6a9976a2eed11b429e59188

      SHA512

      095b62d0288a8be544a989f3949b7afe5415475e8acb379bfc9b31d74a0cecdee81433a84496853edc155cd96df9fe1c3524beaf3decc95b343aafc29ae6c8d8

    • C:\Users\Admin\AppData\Local\Temp\serviceupda.exe

      Filesize

      360KB

      MD5

      a6719ac8e069f3aa4abe2a087a3dd317

      SHA1

      cffd1a8252f418d6d5c8ea3fc36295ca1dd4edcb

      SHA256

      ec187fa1b5e8322ee8f0638c5bc8def4d231b2525d5ec47bf6ba5112b31e8866

      SHA512

      30bfcd2956090505232817b620a78264576bd6208713cd8cdf645e873bf115ffb6e3fe1df8d31fbe5b54ef7e0d8dec485d621671026bb9d93c9d9589773c10db

    • \Users\Admin\AppData\Local\Temp\flashplayer.exe

      Filesize

      1.1MB

      MD5

      96c436d7e2b49f213a983cb3e648b04d

      SHA1

      84ad2263701b370caa15ec6142fa81b2db3342c2

      SHA256

      22225caeedc7e46ccc98af1c6622c626f4d75a93b6a9976a2eed11b429e59188

      SHA512

      095b62d0288a8be544a989f3949b7afe5415475e8acb379bfc9b31d74a0cecdee81433a84496853edc155cd96df9fe1c3524beaf3decc95b343aafc29ae6c8d8

    • \Users\Admin\AppData\Local\Temp\serviceupda.exe

      Filesize

      360KB

      MD5

      a6719ac8e069f3aa4abe2a087a3dd317

      SHA1

      cffd1a8252f418d6d5c8ea3fc36295ca1dd4edcb

      SHA256

      ec187fa1b5e8322ee8f0638c5bc8def4d231b2525d5ec47bf6ba5112b31e8866

      SHA512

      30bfcd2956090505232817b620a78264576bd6208713cd8cdf645e873bf115ffb6e3fe1df8d31fbe5b54ef7e0d8dec485d621671026bb9d93c9d9589773c10db

    • \Users\Admin\AppData\Local\Temp\serviceupda.exe

      Filesize

      360KB

      MD5

      a6719ac8e069f3aa4abe2a087a3dd317

      SHA1

      cffd1a8252f418d6d5c8ea3fc36295ca1dd4edcb

      SHA256

      ec187fa1b5e8322ee8f0638c5bc8def4d231b2525d5ec47bf6ba5112b31e8866

      SHA512

      30bfcd2956090505232817b620a78264576bd6208713cd8cdf645e873bf115ffb6e3fe1df8d31fbe5b54ef7e0d8dec485d621671026bb9d93c9d9589773c10db

    • memory/956-81-0x0000000070AD1000-0x0000000070AD3000-memory.dmp

      Filesize

      8KB

    • memory/1500-68-0x0000000000A40000-0x0000000000E5C000-memory.dmp

      Filesize

      4.1MB

    • memory/1500-70-0x0000000000210000-0x0000000000213000-memory.dmp

      Filesize

      12KB

    • memory/1500-82-0x0000000000A40000-0x0000000000E5C000-memory.dmp

      Filesize

      4.1MB

    • memory/1600-67-0x0000000002E90000-0x00000000032AC000-memory.dmp

      Filesize

      4.1MB

    • memory/1600-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

      Filesize

      8KB