Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 17:17

General

  • Target

    cacd2740d474411f34c5deb162d5fdf3b0a9b1129d4968004275959f5781c337.exe

  • Size

    955KB

  • MD5

    c911064db70166b4432aa7f284d9cdff

  • SHA1

    665d53d2edd82123952672048c13fb1340fa1250

  • SHA256

    cacd2740d474411f34c5deb162d5fdf3b0a9b1129d4968004275959f5781c337

  • SHA512

    bfd4c431a2374e4d77ddd7553988d66dc864721275c9e011dc0dacb0cf4ea72a50e5136264adc9b6a8087808584a28c3a99b5cecf2175aa29cbf227a06566a4e

  • SSDEEP

    24576:uVaOnzQC3nwQmN2K3yWds0JkKyVagMPHPUrEHWZN5Kw:uVaOznlDadsLQ/HWH

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cacd2740d474411f34c5deb162d5fdf3b0a9b1129d4968004275959f5781c337.exe
    "C:\Users\Admin\AppData\Local\Temp\cacd2740d474411f34c5deb162d5fdf3b0a9b1129d4968004275959f5781c337.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pekalongan-community.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:832
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:406531 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:592
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:10564610 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:988
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pekalongan-community.com/
      2⤵
        PID:668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G2V9Z7B9.txt

      Filesize

      601B

      MD5

      a2b12a3fae2881ea35445145482801dd

      SHA1

      f99b9bdcb6b8aff7988cd2426ee2605239a85f82

      SHA256

      a51135ec0eb388d0bdaadf134baebcf14c883afba59b21addd8e7960faf7d6fc

      SHA512

      59f6ffa76333d90dce2731984fc404c332fb2797040bd9ecbbdcfaa84ffbe59836c3afc4dca5e268f1e1aae3037d72f50a5e948dcdb7efc0a39162148097cfe0

    • memory/1376-54-0x0000000000400000-0x00000000004F3E04-memory.dmp

      Filesize

      975KB

    • memory/1376-57-0x0000000075B61000-0x0000000075B63000-memory.dmp

      Filesize

      8KB

    • memory/1376-58-0x0000000004530000-0x00000000046CE000-memory.dmp

      Filesize

      1.6MB

    • memory/1376-60-0x00000000049D0000-0x00000000049E0000-memory.dmp

      Filesize

      64KB

    • memory/1376-59-0x0000000004970000-0x000000000542A000-memory.dmp

      Filesize

      10.7MB

    • memory/1376-63-0x0000000000400000-0x00000000004F3E04-memory.dmp

      Filesize

      975KB