Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:19

General

  • Target

    b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe

  • Size

    288KB

  • MD5

    8f1d838ba4d6c7a51a962d9abfa30c60

  • SHA1

    b942265c3c571b1dd811d2853befa5720065468f

  • SHA256

    b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd

  • SHA512

    1df5440194c5129938cf5640a9c5b2a54de3535721777ad8151e72569344f4ec23d603b3be3b3ab2e080cebf22b22e0edae5dbc8264b45e16912bf20970b8e2f

  • SSDEEP

    3072:AU0nUhhQdiEXIOZAksTCPkix7Fe7dEN8EXgNqf5cTrWi6ei2uiTbtTmH8Fe90p0X:70JiDbYJFsE0NMCP6wJYj8t/cx

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe
    "C:\Users\Admin\AppData\Local\Temp\b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\fmzob.exe
      "C:\Users\Admin\fmzob.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fmzob.exe

    Filesize

    288KB

    MD5

    e6ca04a30519a5890fd88d9d57263cd4

    SHA1

    bb0908091964e216ea450efa17a846436bfa1e60

    SHA256

    cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667

    SHA512

    09871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728

  • C:\Users\Admin\fmzob.exe

    Filesize

    288KB

    MD5

    e6ca04a30519a5890fd88d9d57263cd4

    SHA1

    bb0908091964e216ea450efa17a846436bfa1e60

    SHA256

    cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667

    SHA512

    09871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728

  • \Users\Admin\fmzob.exe

    Filesize

    288KB

    MD5

    e6ca04a30519a5890fd88d9d57263cd4

    SHA1

    bb0908091964e216ea450efa17a846436bfa1e60

    SHA256

    cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667

    SHA512

    09871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728

  • \Users\Admin\fmzob.exe

    Filesize

    288KB

    MD5

    e6ca04a30519a5890fd88d9d57263cd4

    SHA1

    bb0908091964e216ea450efa17a846436bfa1e60

    SHA256

    cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667

    SHA512

    09871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728

  • memory/748-56-0x0000000074FB1000-0x0000000074FB3000-memory.dmp

    Filesize

    8KB