Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 02:04

General

  • Target

    a2672f713b901a1d57b1e4f84d8ae23623ea7a74223379274e201609d6346616.exe

  • Size

    1.0MB

  • MD5

    a269bd7677ba9fce232c8ee6d6bad62f

  • SHA1

    5debad23adec8d5dac2119d8c088d251f74d99c9

  • SHA256

    a2672f713b901a1d57b1e4f84d8ae23623ea7a74223379274e201609d6346616

  • SHA512

    9d30c0813d9b41c91ccb77734fa4e139be5ff0ce50c9aa546c2ec851e423e7071b4add116635751c6d52ca5ea1cdd12bf9089e9584f780921dc1d633d5765614

  • SSDEEP

    24576:TNBKe9FPGCJUKcU9Ty/XVAQTNJhtRUBvR17tWDkmhO:TND9FOCZcU43vi4DkP

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2672f713b901a1d57b1e4f84d8ae23623ea7a74223379274e201609d6346616.exe
    "C:\Users\Admin\AppData\Local\Temp\a2672f713b901a1d57b1e4f84d8ae23623ea7a74223379274e201609d6346616.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsjA383.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsjA383.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/1772-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB