Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe
Resource
win10v2004-20220901-en
General
-
Target
3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe
-
Size
192KB
-
MD5
422f6c9abb6857a6657e0b6cec026400
-
SHA1
1084eb63abb5c7d3d299ec372cb3f36c9ad65adb
-
SHA256
3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7
-
SHA512
7b75c97e0cd0780d0fcf1414ef3b76d6a5f364e27538caf9c7fd0d567d7da2d3d0bc060ae41788593225f855cabed36f5b2c498f5716377ad74a02efa6574b62
-
SSDEEP
6144:Ie346nK2ElbxBuKHBS1EEQoVGkJpDBhk6RZV:bK2EllBuKHcEEQonDdhky
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1972 torrent.exe -
Loads dropped DLL 6 IoCs
pid Process 2040 3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe 1972 torrent.exe 1972 torrent.exe 1972 torrent.exe 1972 torrent.exe 1972 torrent.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\intellidownload\torrent.exe 3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe File created C:\Program Files (x86)\intellidownload\gunzip.exe torrent.exe File created C:\Program Files (x86)\intellidownload\header.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\header2.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\header3.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\next.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\installid torrent.exe File created C:\Program Files (x86)\intellidownload\cc torrent.exe File created C:\Program Files (x86)\intellidownload\status torrent.exe File created C:\Program Files (x86)\intellidownload\skip.bmp torrent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x00090000000139eb-55.dat nsis_installer_1 behavioral1/files/0x00090000000139eb-55.dat nsis_installer_2 behavioral1/files/0x00090000000139eb-57.dat nsis_installer_1 behavioral1/files/0x00090000000139eb-57.dat nsis_installer_2 behavioral1/files/0x00090000000139eb-59.dat nsis_installer_1 behavioral1/files/0x00090000000139eb-59.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1972 2040 3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe 28 PID 2040 wrote to memory of 1972 2040 3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe 28 PID 2040 wrote to memory of 1972 2040 3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe 28 PID 2040 wrote to memory of 1972 2040 3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe"C:\Users\Admin\AppData\Local\Temp\3e03dc5571bded6bc1037a0b62c2260568ef6fd65c98ee1b4c97f74746bdcbd7.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\intellidownload\torrent.exe"C:\Program Files (x86)\intellidownload\torrent.exe" "/name=Verified_50_Shades_darker" "/publisher=1021" "/sub=" "/search=Verified_50_Shades_darker" "/type=search" "/tag=6"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59bb1de9e0f82c295a2715cf91a6e91b6
SHA1c34a30f9e0c5d534cb9f2209345eb3545ad49f34
SHA25608933263580d8eb633f57d0e0011e17421c3f776b5a83f876ff1cf14dada0aac
SHA5122acf6f27a8d9fe0fb78f5b03a541a698278b80dd69f23a56beb431ea25fc5e6983fbbb389f3a7f33b2fcabc3fbf691888ee0dc485dd55add3f9e3f71ceffdfa9
-
Filesize
186KB
MD59bb1de9e0f82c295a2715cf91a6e91b6
SHA1c34a30f9e0c5d534cb9f2209345eb3545ad49f34
SHA25608933263580d8eb633f57d0e0011e17421c3f776b5a83f876ff1cf14dada0aac
SHA5122acf6f27a8d9fe0fb78f5b03a541a698278b80dd69f23a56beb431ea25fc5e6983fbbb389f3a7f33b2fcabc3fbf691888ee0dc485dd55add3f9e3f71ceffdfa9
-
Filesize
186KB
MD59bb1de9e0f82c295a2715cf91a6e91b6
SHA1c34a30f9e0c5d534cb9f2209345eb3545ad49f34
SHA25608933263580d8eb633f57d0e0011e17421c3f776b5a83f876ff1cf14dada0aac
SHA5122acf6f27a8d9fe0fb78f5b03a541a698278b80dd69f23a56beb431ea25fc5e6983fbbb389f3a7f33b2fcabc3fbf691888ee0dc485dd55add3f9e3f71ceffdfa9
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e