Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    247s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 22:14

General

  • Target

    d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945.exe

  • Size

    16KB

  • MD5

    6d8e6d8409359382519fbe6d43a27d66

  • SHA1

    3f2290a9f01ac3384a428cadd0a39d305eacb831

  • SHA256

    d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945

  • SHA512

    27925b6b7d3de939ec0fac74d4997c7be2b800e6778b9e276f20dd6de1662aca73832b423981591bbe0200b4885b9a8549eb77ef24609c4799e4e2f8338cf70f

  • SSDEEP

    384:rwxFz66WAVDoG9LG16gZLZYJ5GOLPH1SiVRPlZjNLFx6p:r8ctAtBQ16CZYfGOoKPFxq

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 44 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945.exe
    "C:\Users\Admin\AppData\Local\Temp\d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe advpack.dll,DelNodeRunDLL32 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
      2⤵
        PID:1172
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
          3⤵
          • Modifies registry class
          • Runs .reg file with regedit
          PID:620

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\TempIE.reg

      Filesize

      2KB

      MD5

      bf050ae6f7573dbb0823dff030851dee

      SHA1

      46de6ffd8e85c6edce14aa9a730ca776cf1fad46

      SHA256

      9d483d5aa98bf9dc97306442769f4703f07e7ea3fce24fedd169e3b15d7385b2

      SHA512

      b708ec524211d7787e4540f2f7c6103720c2f523e26ea4c854558edc734e59bc6a4e14e350b4ebf1af7a75718fe85a7d28e765405f629c9304ef67fa3b246846

    • memory/472-54-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/472-57-0x00000000767C1000-0x00000000767C3000-memory.dmp

      Filesize

      8KB

    • memory/472-64-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB