Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    208s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 22:30

General

  • Target

    6ce0e245b16cae14448bfd519c2e887777381159e7fd0fc442575a7f5e694222.exe

  • Size

    192KB

  • MD5

    6f5a9d9f99aeb5099ef07a65fbf82379

  • SHA1

    48665304dc370d133e7894b4f89a6ec776b904f7

  • SHA256

    6ce0e245b16cae14448bfd519c2e887777381159e7fd0fc442575a7f5e694222

  • SHA512

    0a089e3517513269320ead437fcf838c01586697a41d70f82a7357ae9ded7e940e00b98d05c9687f45d295c6b629582810d144b3589902afe11b21abfa78a1a0

  • SSDEEP

    3072:3u8+MvBnOBrpM3lt0bqO4deKIpS2Q9tC3UwtxaTSGzGXDzp8D8OJbhaDge3oKZ:5nOBr63cbqO40K394aTSGzGZ8ogcYA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ce0e245b16cae14448bfd519c2e887777381159e7fd0fc442575a7f5e694222.exe
    "C:\Users\Admin\AppData\Local\Temp\6ce0e245b16cae14448bfd519c2e887777381159e7fd0fc442575a7f5e694222.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\xaifu.exe
      "C:\Users\Admin\xaifu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xaifu.exe

    Filesize

    192KB

    MD5

    a9e928cd98a43c9885782a5139a721ac

    SHA1

    294016679d26c1adbc6688b3dca2dfc800dcb276

    SHA256

    38bd5a9ad999054b8c3b6e4c0a6e654bceb379e8fed2962d8043529292b005ca

    SHA512

    bd7f8d03a0fb423881677293d3b20b9a081c7771772d9d826052924f3e25cacda9f7d91da738be016eab90c14314e94d6a22fd2a322d61358a14cb4aadb596ac

  • C:\Users\Admin\xaifu.exe

    Filesize

    192KB

    MD5

    a9e928cd98a43c9885782a5139a721ac

    SHA1

    294016679d26c1adbc6688b3dca2dfc800dcb276

    SHA256

    38bd5a9ad999054b8c3b6e4c0a6e654bceb379e8fed2962d8043529292b005ca

    SHA512

    bd7f8d03a0fb423881677293d3b20b9a081c7771772d9d826052924f3e25cacda9f7d91da738be016eab90c14314e94d6a22fd2a322d61358a14cb4aadb596ac

  • \Users\Admin\xaifu.exe

    Filesize

    192KB

    MD5

    a9e928cd98a43c9885782a5139a721ac

    SHA1

    294016679d26c1adbc6688b3dca2dfc800dcb276

    SHA256

    38bd5a9ad999054b8c3b6e4c0a6e654bceb379e8fed2962d8043529292b005ca

    SHA512

    bd7f8d03a0fb423881677293d3b20b9a081c7771772d9d826052924f3e25cacda9f7d91da738be016eab90c14314e94d6a22fd2a322d61358a14cb4aadb596ac

  • \Users\Admin\xaifu.exe

    Filesize

    192KB

    MD5

    a9e928cd98a43c9885782a5139a721ac

    SHA1

    294016679d26c1adbc6688b3dca2dfc800dcb276

    SHA256

    38bd5a9ad999054b8c3b6e4c0a6e654bceb379e8fed2962d8043529292b005ca

    SHA512

    bd7f8d03a0fb423881677293d3b20b9a081c7771772d9d826052924f3e25cacda9f7d91da738be016eab90c14314e94d6a22fd2a322d61358a14cb4aadb596ac

  • memory/1340-67-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1340-70-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2012-56-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2012-57-0x00000000767F1000-0x00000000767F3000-memory.dmp

    Filesize

    8KB

  • memory/2012-65-0x0000000002D60000-0x0000000002D91000-memory.dmp

    Filesize

    196KB

  • memory/2012-66-0x0000000002D60000-0x0000000002D91000-memory.dmp

    Filesize

    196KB

  • memory/2012-69-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB