Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe
Resource
win10v2004-20220901-en
General
-
Target
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe
-
Size
78KB
-
MD5
945003bafa2e3c6d008df685e9820d36
-
SHA1
583f4e1455e6d64eb273f90e2ed3c92f355319c2
-
SHA256
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96
-
SHA512
e9c47d4fbcb6076e0869d2965f6d594ba4c6db6069262bd7d8beb74fa929bd705ae58647219e69b1afe57e152ddab0ee1f40dff1e7f85a9003da12fcd0fa9247
-
SSDEEP
768:Q//QAtksRzwFys/n/L/n/Iy9y+fCn9wDVLrIzepPTeJttsud0MFtg4szKjugeanz:Q34I8/jfK+qOVnIYPyuMo4OaKYLFr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 472 dwm.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 664 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9c67cd1d587548c4935cdea93d6e94fd.exe dwm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9c67cd1d587548c4935cdea93d6e94fd.exe dwm.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\9c67cd1d587548c4935cdea93d6e94fd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dwm.exe\" .." dwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\9c67cd1d587548c4935cdea93d6e94fd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dwm.exe\" .." dwm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 472 dwm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 472 dwm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 472 1992 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe 28 PID 1992 wrote to memory of 472 1992 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe 28 PID 1992 wrote to memory of 472 1992 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe 28 PID 1992 wrote to memory of 472 1992 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe 28 PID 472 wrote to memory of 664 472 dwm.exe 29 PID 472 wrote to memory of 664 472 dwm.exe 29 PID 472 wrote to memory of 664 472 dwm.exe 29 PID 472 wrote to memory of 664 472 dwm.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe"C:\Users\Admin\AppData\Local\Temp\39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\dwm.exe"C:\Users\Admin\AppData\Local\Temp\dwm.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\dwm.exe" "dwm.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:664
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5945003bafa2e3c6d008df685e9820d36
SHA1583f4e1455e6d64eb273f90e2ed3c92f355319c2
SHA25639fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96
SHA512e9c47d4fbcb6076e0869d2965f6d594ba4c6db6069262bd7d8beb74fa929bd705ae58647219e69b1afe57e152ddab0ee1f40dff1e7f85a9003da12fcd0fa9247
-
Filesize
78KB
MD5945003bafa2e3c6d008df685e9820d36
SHA1583f4e1455e6d64eb273f90e2ed3c92f355319c2
SHA25639fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96
SHA512e9c47d4fbcb6076e0869d2965f6d594ba4c6db6069262bd7d8beb74fa929bd705ae58647219e69b1afe57e152ddab0ee1f40dff1e7f85a9003da12fcd0fa9247
-
Filesize
78KB
MD5945003bafa2e3c6d008df685e9820d36
SHA1583f4e1455e6d64eb273f90e2ed3c92f355319c2
SHA25639fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96
SHA512e9c47d4fbcb6076e0869d2965f6d594ba4c6db6069262bd7d8beb74fa929bd705ae58647219e69b1afe57e152ddab0ee1f40dff1e7f85a9003da12fcd0fa9247