Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe
Resource
win10v2004-20220901-en
General
-
Target
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe
-
Size
669KB
-
MD5
f77a78db60b09f6dd1c5e46981a40683
-
SHA1
b57eec71cecce31b28ab90d29f952b0b3b97c490
-
SHA256
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347
-
SHA512
6766165d47c57270780fca76ba2e4d726977e4aacf727bba23be815fccb37bfa78df4ca7d3baa99ad76815a439916ec078fa1639a55a1ee26bbd1353fe09d6e0
-
SSDEEP
12288:wnmaWd0zLoWcebTpPlYcFyfXvHF3Z4mxxeDqVTVOCny:wmaWuw6TZ6ccXfQmXtVTzny
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1520 2.exe -
Loads dropped DLL 2 IoCs
pid Process 996 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 996 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Fiele Ps.txt 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 996 wrote to memory of 1520 996 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 27 PID 996 wrote to memory of 1520 996 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 27 PID 996 wrote to memory of 1520 996 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 27 PID 996 wrote to memory of 1520 996 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 27 PID 1520 wrote to memory of 764 1520 2.exe 28 PID 1520 wrote to memory of 764 1520 2.exe 28 PID 1520 wrote to memory of 764 1520 2.exe 28 PID 1520 wrote to memory of 764 1520 2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe"C:\Users\Admin\AppData\Local\Temp\90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD509e4173c823325da3a9dea8927b38d3d
SHA160b2a238461b35c394ea8423a7cfd990e8ad0c9a
SHA2565303856f73b771c06cb967455e7f13d8a22472dbb56bfe8ecd4807e9f5d9f29d
SHA5128a001aeeb5d4c98e341b9c87c1159e6fade4003053c1852d957e9f3bba90347a76d88841fd21fd7cbb605518a703293278bb73994593c9e9ea6b8e8dfdda1175
-
Filesize
355KB
MD509e4173c823325da3a9dea8927b38d3d
SHA160b2a238461b35c394ea8423a7cfd990e8ad0c9a
SHA2565303856f73b771c06cb967455e7f13d8a22472dbb56bfe8ecd4807e9f5d9f29d
SHA5128a001aeeb5d4c98e341b9c87c1159e6fade4003053c1852d957e9f3bba90347a76d88841fd21fd7cbb605518a703293278bb73994593c9e9ea6b8e8dfdda1175
-
Filesize
355KB
MD509e4173c823325da3a9dea8927b38d3d
SHA160b2a238461b35c394ea8423a7cfd990e8ad0c9a
SHA2565303856f73b771c06cb967455e7f13d8a22472dbb56bfe8ecd4807e9f5d9f29d
SHA5128a001aeeb5d4c98e341b9c87c1159e6fade4003053c1852d957e9f3bba90347a76d88841fd21fd7cbb605518a703293278bb73994593c9e9ea6b8e8dfdda1175
-
Filesize
355KB
MD509e4173c823325da3a9dea8927b38d3d
SHA160b2a238461b35c394ea8423a7cfd990e8ad0c9a
SHA2565303856f73b771c06cb967455e7f13d8a22472dbb56bfe8ecd4807e9f5d9f29d
SHA5128a001aeeb5d4c98e341b9c87c1159e6fade4003053c1852d957e9f3bba90347a76d88841fd21fd7cbb605518a703293278bb73994593c9e9ea6b8e8dfdda1175