Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe
Resource
win10v2004-20221111-en
General
-
Target
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe
-
Size
185KB
-
MD5
0e22dc4ec23c2ad3e944ebe6b52a49f5
-
SHA1
ce8466ca405cc6951e0a5fd7f5623763fb890d87
-
SHA256
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6
-
SHA512
b1d87a5448b76caddb89ff116516fc2ea06341b9998152b7cfad547e941588dae72db69f538b42874ec3340d66270d33d3c7519cdf21088b37bd12898b978845
-
SSDEEP
3072:Yoaqm6uw0n+amEoK4OG01qhzJ5yMGh6DGj4t5u7LAzGtEfo6ta6dDKKEp7xz1S+d:YRqmpp+amNOGokzLyM9tsLAitQo6tzON
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1944 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\lncom_.jpg 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe File created C:\Windows\SysWOW64\lncom.exe 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1944 1604 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe 28 PID 1604 wrote to memory of 1944 1604 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe 28 PID 1604 wrote to memory of 1944 1604 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe 28 PID 1604 wrote to memory of 1944 1604 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe"C:\Users\Admin\AppData\Local\Temp\7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7294EE~1.EXE.bat2⤵
- Deletes itself
PID:1944
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD52a6cc6651b4f211285c3a5912d3620be
SHA1c5805ef09471f36cded5c50fd3016398e3f9b374
SHA256808f81d656c36d987597fb5beb020bfdbf746421b3acc9d9836fd04981dba6e5
SHA51256cf58226f58599c52c1ed459bd82935d92ff1d667c0d418afb582a6c285e450af4dcdd6d63f982ae82d389e15b6d95bd258dc4ad04f7cc3530dfc1aea0c2940
-
Filesize
185KB
MD5aad2b5300310c5e367c1ef4e524e76a5
SHA13a88ad78e3254bcf14921e3a0af8449ba3d85429
SHA256b7439f0a7d5252fb482f179c1676b2a6edcdab248a254926568af50713d545f9
SHA51289788437c4279b6570c25532d46e7d8076ca7c55acd5732708055b596da6f9cbabc964a94212a35a06cba0ab23ff6aaf8c5255ca33edee098ebe014434b49365