Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    33s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 10:34

General

  • Target

    e109c39092f1fa1ee1f912e2724fa147eab7ea646a161398cd4dca39f083381b.exe

  • Size

    334KB

  • MD5

    84d5f05716bb0757445d5de1d3234d56

  • SHA1

    dbd3391b489e08d61619fa4411bf692e9b7bcc2b

  • SHA256

    e109c39092f1fa1ee1f912e2724fa147eab7ea646a161398cd4dca39f083381b

  • SHA512

    1062ebb72d73e66d5c8e4dbf19a25f922bcee908aa79734cae0991adac66538b902632041a08300d82f5f179f05ffcf1363d1356c28b2a6b6ed5f188c7f1d42b

  • SSDEEP

    6144:5sQs/vBMOPmur84AXl/eWcsGtMYRCiDm7BUWUgEG6b0yRrOp5C2+zq4zuFE:5sQs2Amur8l90sGe4CiDm7B5INbN5K5S

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Disables RegEdit via registry modification 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e109c39092f1fa1ee1f912e2724fa147eab7ea646a161398cd4dca39f083381b.exe
    "C:\Users\Admin\AppData\Local\Temp\e109c39092f1fa1ee1f912e2724fa147eab7ea646a161398cd4dca39f083381b.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    PID:1968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\DNS\Catcher.dll

    Filesize

    516KB

    MD5

    a6de7da83c695be6cbddc533e1240d39

    SHA1

    ae2b622569def5ee0d5ee1903cd138b8a7dcae9b

    SHA256

    cb39e38434374d3b669b821f1b2a72ae838f6c1086e5c26cdce08fafb2f00236

    SHA512

    17f236691ab35bedc07be2f24c503fa0563a44172e8886a9ae313279b9f1e9b60f99b37558da4109c58e9d32a517df8f1f49816c6e50c91661afdc526b333d47

  • \Users\Admin\AppData\Local\Temp\nsi1142.tmp\System.dll

    Filesize

    10KB

    MD5

    d4d09da0218ba046a66a294f0cca9dfe

    SHA1

    417b1acdeb0a4de6ac752a93080ca5b9164eb44b

    SHA256

    9090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3

    SHA512

    3bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf

  • \Users\Admin\AppData\Local\Temp\nsi1142.tmp\System.dll

    Filesize

    10KB

    MD5

    d4d09da0218ba046a66a294f0cca9dfe

    SHA1

    417b1acdeb0a4de6ac752a93080ca5b9164eb44b

    SHA256

    9090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3

    SHA512

    3bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf

  • \Users\Admin\AppData\Local\Temp\nsi1142.tmp\System.dll

    Filesize

    10KB

    MD5

    d4d09da0218ba046a66a294f0cca9dfe

    SHA1

    417b1acdeb0a4de6ac752a93080ca5b9164eb44b

    SHA256

    9090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3

    SHA512

    3bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf

  • \Users\Admin\AppData\Local\Temp\nsi1142.tmp\nsRandom.dll

    Filesize

    21KB

    MD5

    ab467b8dfaa660a0f0e5b26e28af5735

    SHA1

    596abd2c31eaff3479edf2069db1c155b59ce74d

    SHA256

    db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73

    SHA512

    7d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301

  • \Users\Admin\AppData\Local\Temp\nsi1142.tmp\nsRandom.dll

    Filesize

    21KB

    MD5

    ab467b8dfaa660a0f0e5b26e28af5735

    SHA1

    596abd2c31eaff3479edf2069db1c155b59ce74d

    SHA256

    db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73

    SHA512

    7d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301

  • \Users\Admin\AppData\Local\Temp\nsi1142.tmp\nsRandom.dll

    Filesize

    21KB

    MD5

    ab467b8dfaa660a0f0e5b26e28af5735

    SHA1

    596abd2c31eaff3479edf2069db1c155b59ce74d

    SHA256

    db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73

    SHA512

    7d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301

  • \Users\Admin\AppData\Local\Temp\nsi1142.tmp\nsisdt.dll

    Filesize

    5KB

    MD5

    df4795dfabe3bc9278a73d496cc4b40d

    SHA1

    2648ded47e29ecf3e1a1cc20c631e83caf566897

    SHA256

    2261027077f23c8dba6b72af28862832aaa059740d0f5634b46cabb14326dd10

    SHA512

    013d9712c3d699a7f41ab3e55931c9abb421fb2eda3542da5a4831ad2f073a1b0643120cc78147db0bfcd01df98ade3045ecb2f1e252fff1dc40be845e5ae303

  • memory/1968-54-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB

  • memory/1968-63-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1968-64-0x00000000004A0000-0x0000000000505000-memory.dmp

    Filesize

    404KB