Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    40s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 21:44

General

  • Target

    6f0cacf34faba49af88f975b76c66d72d1c21928e35b0d6983df86ad8c22a2bc.exe

  • Size

    76KB

  • MD5

    48230377eef1133712c3945b551890d9

  • SHA1

    264f853961120c4166d215ed08675b55247d10de

  • SHA256

    6f0cacf34faba49af88f975b76c66d72d1c21928e35b0d6983df86ad8c22a2bc

  • SHA512

    8cb30fdfa17ec17898b3138519aff055874b7d5c2d457242cffae91a045f1c361ec65c4d038b3b47eb658162b55b3980a477c3b6a27b0955e0ecef6e2e434b3c

  • SSDEEP

    1536:ULXB65939tY6HBg4sXJlb36UJVq2PBbYOQ+38Xx/9t/jKISm0qHWZ:ULk395hYXJ93F8OQK8Xxb7rSeE

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 13 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 23 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0cacf34faba49af88f975b76c66d72d1c21928e35b0d6983df86ad8c22a2bc.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0cacf34faba49af88f975b76c66d72d1c21928e35b0d6983df86ad8c22a2bc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\fzwg.exe
      "C:\Users\Admin\AppData\Local\Temp\fzwg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\wsafe.exe
      "C:\Users\Admin\AppData\Local\Temp\wsafe.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Users\Admin\AppData\Local\Temp\BEDD.tmp
        "C:\Users\Admin\AppData\Local\Temp\BEDD.tmp" "C:\Users\Admin\AppData\Local\Temp\wsafe.exe" "1860"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 shell32,Control_RunDLL "C:\ProgramData\360data\2e219239.z"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1332
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 "C:\ProgramData\360data\operar32.dll",_RunAs@16
            5⤵
            • Loads dropped DLL
            PID:1760
          • C:\Windows\system32\RunDll32.exe
            C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\ProgramData\360data\2e219239.z"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1696
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\ProgramData\360data\2e219239.z"
              6⤵
              • Loads dropped DLL
              • Modifies registry class
              PID:1052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • C:\ProgramData\360data\operar32.dll

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • C:\Users\Admin\AppData\Local\Temp\BEDD.tmp

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • C:\Users\Admin\AppData\Local\Temp\BEDD.tmp

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • C:\Users\Admin\AppData\Local\Temp\fzwg.exe

    Filesize

    48KB

    MD5

    8fa3b84b97ecb168ebee8c94ed3e4908

    SHA1

    d200951fc47ecc8669bc4b1abdce8156c81c58af

    SHA256

    e02f4d186f740586f3d356db7bbbf3e69d3e78f4983598a7555be9cb720fbb50

    SHA512

    5a5d96b5c64043a2b60a5d646283497dc115e25c82f93261fed02583718eef85772024437b81f85f558d4302bbd5e738d37aa2ffb938f2eb9967ba0c7f72c500

  • C:\Users\Admin\AppData\Local\Temp\fzwg.exe

    Filesize

    48KB

    MD5

    8fa3b84b97ecb168ebee8c94ed3e4908

    SHA1

    d200951fc47ecc8669bc4b1abdce8156c81c58af

    SHA256

    e02f4d186f740586f3d356db7bbbf3e69d3e78f4983598a7555be9cb720fbb50

    SHA512

    5a5d96b5c64043a2b60a5d646283497dc115e25c82f93261fed02583718eef85772024437b81f85f558d4302bbd5e738d37aa2ffb938f2eb9967ba0c7f72c500

  • C:\Users\Admin\AppData\Local\Temp\wsafe.exe

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • C:\Users\Admin\AppData\Local\Temp\wsafe.exe

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • \ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\2e219239.z

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\operar32.dll

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\operar32.dll

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\operar32.dll

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \ProgramData\360data\operar32.dll

    Filesize

    33KB

    MD5

    86d4b827ea5393cc8afe352d6229bf0e

    SHA1

    9ab6e6a8a16891b20dfc448c474caca09331dd33

    SHA256

    58d32c4228b5296306c3f30f14f1e1ad73352aab2bc87042f1c0aa8e64c465b3

    SHA512

    aab97abff355eb9b93db281809b52f6c936947d18327de7463533d1cd0e4c305b8d46f7fe4646eee4b3f7db7d68d4535dccf4d1c59011b593eb4327b34afbe14

  • \Users\Admin\AppData\Local\Temp\BEDD.tmp

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • \Users\Admin\AppData\Local\Temp\BEDD.tmp

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • \Users\Admin\AppData\Local\Temp\fzwg.exe

    Filesize

    48KB

    MD5

    8fa3b84b97ecb168ebee8c94ed3e4908

    SHA1

    d200951fc47ecc8669bc4b1abdce8156c81c58af

    SHA256

    e02f4d186f740586f3d356db7bbbf3e69d3e78f4983598a7555be9cb720fbb50

    SHA512

    5a5d96b5c64043a2b60a5d646283497dc115e25c82f93261fed02583718eef85772024437b81f85f558d4302bbd5e738d37aa2ffb938f2eb9967ba0c7f72c500

  • \Users\Admin\AppData\Local\Temp\fzwg.exe

    Filesize

    48KB

    MD5

    8fa3b84b97ecb168ebee8c94ed3e4908

    SHA1

    d200951fc47ecc8669bc4b1abdce8156c81c58af

    SHA256

    e02f4d186f740586f3d356db7bbbf3e69d3e78f4983598a7555be9cb720fbb50

    SHA512

    5a5d96b5c64043a2b60a5d646283497dc115e25c82f93261fed02583718eef85772024437b81f85f558d4302bbd5e738d37aa2ffb938f2eb9967ba0c7f72c500

  • \Users\Admin\AppData\Local\Temp\fzwg.exe

    Filesize

    48KB

    MD5

    8fa3b84b97ecb168ebee8c94ed3e4908

    SHA1

    d200951fc47ecc8669bc4b1abdce8156c81c58af

    SHA256

    e02f4d186f740586f3d356db7bbbf3e69d3e78f4983598a7555be9cb720fbb50

    SHA512

    5a5d96b5c64043a2b60a5d646283497dc115e25c82f93261fed02583718eef85772024437b81f85f558d4302bbd5e738d37aa2ffb938f2eb9967ba0c7f72c500

  • \Users\Admin\AppData\Local\Temp\fzwg.exe

    Filesize

    48KB

    MD5

    8fa3b84b97ecb168ebee8c94ed3e4908

    SHA1

    d200951fc47ecc8669bc4b1abdce8156c81c58af

    SHA256

    e02f4d186f740586f3d356db7bbbf3e69d3e78f4983598a7555be9cb720fbb50

    SHA512

    5a5d96b5c64043a2b60a5d646283497dc115e25c82f93261fed02583718eef85772024437b81f85f558d4302bbd5e738d37aa2ffb938f2eb9967ba0c7f72c500

  • \Users\Admin\AppData\Local\Temp\fzwg.exe

    Filesize

    48KB

    MD5

    8fa3b84b97ecb168ebee8c94ed3e4908

    SHA1

    d200951fc47ecc8669bc4b1abdce8156c81c58af

    SHA256

    e02f4d186f740586f3d356db7bbbf3e69d3e78f4983598a7555be9cb720fbb50

    SHA512

    5a5d96b5c64043a2b60a5d646283497dc115e25c82f93261fed02583718eef85772024437b81f85f558d4302bbd5e738d37aa2ffb938f2eb9967ba0c7f72c500

  • \Users\Admin\AppData\Local\Temp\wsafe.exe

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • \Users\Admin\AppData\Local\Temp\wsafe.exe

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • \Users\Admin\AppData\Local\Temp\wsafe.exe

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • \Users\Admin\AppData\Local\Temp\wsafe.exe

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • \Users\Admin\AppData\Local\Temp\wsafe.exe

    Filesize

    39KB

    MD5

    c2b31b3ccb5a4ff1b546eff12835a14e

    SHA1

    a7aa54d3ff74c1c8b8c701df985d7cb903c70770

    SHA256

    0e7864e7531f48c21264f85bba075615bc250693b50e89287747c961fb837cf0

    SHA512

    0be1271ba6e0ca3957d51be38a558d2aac8a2e4f427cb8e0d924313f08a8d6ea12f3a69cf28ec0ae5dd6855bc706a584e16ca3b3482fd64cad18091ca613a3ce

  • memory/1332-111-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1332-102-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1376-88-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1612-65-0x0000000000B60000-0x0000000000B6D000-memory.dmp

    Filesize

    52KB

  • memory/1612-54-0x0000000076681000-0x0000000076683000-memory.dmp

    Filesize

    8KB

  • memory/1612-64-0x0000000000B60000-0x0000000000B6D000-memory.dmp

    Filesize

    52KB

  • memory/1760-114-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB

  • memory/1760-103-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1760-104-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB

  • memory/1760-113-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1760-112-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1860-66-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1860-101-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1860-86-0x0000000000020000-0x000000000002D000-memory.dmp

    Filesize

    52KB

  • memory/1860-85-0x0000000000020000-0x000000000002D000-memory.dmp

    Filesize

    52KB

  • memory/1860-87-0x0000000000240000-0x000000000024D000-memory.dmp

    Filesize

    52KB

  • memory/1860-84-0x0000000000020000-0x000000000002D000-memory.dmp

    Filesize

    52KB