Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
Scan.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Scan.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
torpat/micropublishing.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
torpat/micropublishing.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
torpat/sueJl.cmd
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
torpat/sueJl.cmd
Resource
win10v2004-20221111-en
General
-
Target
Scan.lnk
-
Size
2KB
-
MD5
f3af4f62c6e8e9c2ea02ba43e284cace
-
SHA1
b415f25d6863e81ef48d2e5608f8957072a01776
-
SHA256
5a4d19234330276457f2a8a87af5d5df88d94d6d5a495d5bc7ebd81d677ea10f
-
SHA512
7355227536a684e8cb002dd3d8e36a72695a4197d23561acb0263d59bb3aa65e230830ff7d0b98c75b6fd032ef0d6cb1f3f8376a5dbee6fee7d01538ce45883c
Malware Config
Extracted
icedid
2271535685
babysoftletirs.com
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 660 rundll32.exe 4 660 rundll32.exe 5 660 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 660 rundll32.exe 660 rundll32.exe 660 rundll32.exe 660 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 660 rundll32.exe 660 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 872 wrote to memory of 1160 872 cmd.exe 29 PID 872 wrote to memory of 1160 872 cmd.exe 29 PID 872 wrote to memory of 1160 872 cmd.exe 29 PID 1160 wrote to memory of 580 1160 cmd.exe 30 PID 1160 wrote to memory of 580 1160 cmd.exe 30 PID 1160 wrote to memory of 580 1160 cmd.exe 30 PID 1160 wrote to memory of 660 1160 cmd.exe 31 PID 1160 wrote to memory of 660 1160 cmd.exe 31 PID 1160 wrote to memory of 660 1160 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Scan.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c torpat\sueJl.cmd ljIV2⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h torpat\micropublishing.dll C:\Users\Admin\AppData\Local\Temp\*3⤵PID:580
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\micropublishing.dll,#13⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
Filesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
Filesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
Filesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
Filesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39