Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:18

General

  • Target

    d09a4af73e886805dea6984bb879a347bc5a300a8cbacad90e2425aae2a05e32.exe

  • Size

    216KB

  • MD5

    815ec385f55398e0d411b921a311c1a8

  • SHA1

    9a6315aa747375133cb61f18c2e468071fa40ab6

  • SHA256

    d09a4af73e886805dea6984bb879a347bc5a300a8cbacad90e2425aae2a05e32

  • SHA512

    f0fabb15b47a2add622c5a5d448008bbfeccc2073fc10ea7dde6c930af6d0f091a0eaa93e4017d4974eb5e95f13f6daa07788016276900ed37d3e7f62ca48acc

  • SSDEEP

    6144:324Ifrt3+TetonBi3QxRy4g09ICSnqf9uSUgkxtpsaPjK/bEoK828fwAoEn+MKb:32zrt3+TetonBi3QxRwfnqf9uSUgkxt7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d09a4af73e886805dea6984bb879a347bc5a300a8cbacad90e2425aae2a05e32.exe
    "C:\Users\Admin\AppData\Local\Temp\d09a4af73e886805dea6984bb879a347bc5a300a8cbacad90e2425aae2a05e32.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Users\Admin\goifuel.exe
      "C:\Users\Admin\goifuel.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\goifuel.exe

    Filesize

    216KB

    MD5

    79db3fd9b094694c7174bdb88a308267

    SHA1

    c6115a8f2a543628d72e2911f430fe763a17bbc6

    SHA256

    6acb63f7574052e1a4648f334bbc426cd330997f407ef2f24dbbd37a83da060b

    SHA512

    b22e2922fc9705d4ea4f1981b333b1be2695b823ff1118b81e48d9ad65c641bd123048d1a2911d0be63cba7ac561ac976f578f10cf5ee9ee2ff0788bd63e4239

  • C:\Users\Admin\goifuel.exe

    Filesize

    216KB

    MD5

    79db3fd9b094694c7174bdb88a308267

    SHA1

    c6115a8f2a543628d72e2911f430fe763a17bbc6

    SHA256

    6acb63f7574052e1a4648f334bbc426cd330997f407ef2f24dbbd37a83da060b

    SHA512

    b22e2922fc9705d4ea4f1981b333b1be2695b823ff1118b81e48d9ad65c641bd123048d1a2911d0be63cba7ac561ac976f578f10cf5ee9ee2ff0788bd63e4239

  • \Users\Admin\goifuel.exe

    Filesize

    216KB

    MD5

    79db3fd9b094694c7174bdb88a308267

    SHA1

    c6115a8f2a543628d72e2911f430fe763a17bbc6

    SHA256

    6acb63f7574052e1a4648f334bbc426cd330997f407ef2f24dbbd37a83da060b

    SHA512

    b22e2922fc9705d4ea4f1981b333b1be2695b823ff1118b81e48d9ad65c641bd123048d1a2911d0be63cba7ac561ac976f578f10cf5ee9ee2ff0788bd63e4239

  • \Users\Admin\goifuel.exe

    Filesize

    216KB

    MD5

    79db3fd9b094694c7174bdb88a308267

    SHA1

    c6115a8f2a543628d72e2911f430fe763a17bbc6

    SHA256

    6acb63f7574052e1a4648f334bbc426cd330997f407ef2f24dbbd37a83da060b

    SHA512

    b22e2922fc9705d4ea4f1981b333b1be2695b823ff1118b81e48d9ad65c641bd123048d1a2911d0be63cba7ac561ac976f578f10cf5ee9ee2ff0788bd63e4239

  • memory/1468-56-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB