Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    37s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 18:23

General

  • Target

    6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe

  • Size

    175KB

  • MD5

    04507f09010f494cddd6e430d0f36df0

  • SHA1

    32e1a730d3556e80e329107677a4b761fb21057a

  • SHA256

    6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd

  • SHA512

    17e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684

  • SSDEEP

    3072:HUa4ujEO3O5dKr+mTN5wUyFVoEnsTtTkcagnaLnyE/ubLcPx2RyAPoDvhP4oB+Ra:Ku85Qrr4UA5cnswbgPxgyAPEvhPiRmwy

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe
    "C:\Users\Admin\AppData\Local\Temp\6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Windows\SysWOW64\oshell32.exe
      "C:\Windows\system32\oshell32.exe" \erit "C:\Users\Admin\AppData\Local\Temp\6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe"
      2⤵
      • Executes dropped EXE
      PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\oshell32.exe

    Filesize

    175KB

    MD5

    04507f09010f494cddd6e430d0f36df0

    SHA1

    32e1a730d3556e80e329107677a4b761fb21057a

    SHA256

    6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd

    SHA512

    17e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684

  • \Windows\SysWOW64\oshell32.exe

    Filesize

    175KB

    MD5

    04507f09010f494cddd6e430d0f36df0

    SHA1

    32e1a730d3556e80e329107677a4b761fb21057a

    SHA256

    6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd

    SHA512

    17e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684

  • \Windows\SysWOW64\oshell32.exe

    Filesize

    175KB

    MD5

    04507f09010f494cddd6e430d0f36df0

    SHA1

    32e1a730d3556e80e329107677a4b761fb21057a

    SHA256

    6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd

    SHA512

    17e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684

  • memory/1132-54-0x0000000075561000-0x0000000075563000-memory.dmp

    Filesize

    8KB

  • memory/1132-55-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1132-56-0x0000000002CC0000-0x0000000002CD0000-memory.dmp

    Filesize

    64KB

  • memory/1132-63-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1672-62-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB