Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe
Resource
win10v2004-20220812-en
General
-
Target
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe
-
Size
40KB
-
MD5
3977442beb038b57d50aaf11fcc5f589
-
SHA1
8274cf3ce45c8973d292927d7dc57e9e2aa11a5c
-
SHA256
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0
-
SHA512
6422fbefb1a94ee7dcba25ec401df262d7fd7cb884bc9371b7e30447859df9c0b641caa938a96009864a6cd954336567ea8db0736f7a233c17d37f6d359e9818
-
SSDEEP
384:LlqPDZD1zHET9F8Esd8vmccAbpbNDgITHRN4EddWjRHbG3HQLqVIaO/pPHkRFNcx:L8ZD1DIGddEDbvHN4wkQ3wLMisC+JL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 Windows.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2020 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\55b3825ee39ada2fcddf7c7accbde69e.exe Windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\55b3825ee39ada2fcddf7c7accbde69e.exe Windows.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\55b3825ee39ada2fcddf7c7accbde69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\55b3825ee39ada2fcddf7c7accbde69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 Windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2044 Windows.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2044 1932 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe 27 PID 1932 wrote to memory of 2044 1932 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe 27 PID 1932 wrote to memory of 2044 1932 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe 27 PID 1932 wrote to memory of 2044 1932 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe 27 PID 2044 wrote to memory of 2020 2044 Windows.exe 28 PID 2044 wrote to memory of 2020 2044 Windows.exe 28 PID 2044 wrote to memory of 2020 2044 Windows.exe 28 PID 2044 wrote to memory of 2020 2044 Windows.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe"C:\Users\Admin\AppData\Local\Temp\bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Windows.exe"C:\Users\Admin\AppData\Local\Temp\Windows.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Windows.exe" "Windows.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD53977442beb038b57d50aaf11fcc5f589
SHA18274cf3ce45c8973d292927d7dc57e9e2aa11a5c
SHA256bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0
SHA5126422fbefb1a94ee7dcba25ec401df262d7fd7cb884bc9371b7e30447859df9c0b641caa938a96009864a6cd954336567ea8db0736f7a233c17d37f6d359e9818
-
Filesize
40KB
MD53977442beb038b57d50aaf11fcc5f589
SHA18274cf3ce45c8973d292927d7dc57e9e2aa11a5c
SHA256bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0
SHA5126422fbefb1a94ee7dcba25ec401df262d7fd7cb884bc9371b7e30447859df9c0b641caa938a96009864a6cd954336567ea8db0736f7a233c17d37f6d359e9818
-
Filesize
40KB
MD53977442beb038b57d50aaf11fcc5f589
SHA18274cf3ce45c8973d292927d7dc57e9e2aa11a5c
SHA256bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0
SHA5126422fbefb1a94ee7dcba25ec401df262d7fd7cb884bc9371b7e30447859df9c0b641caa938a96009864a6cd954336567ea8db0736f7a233c17d37f6d359e9818