Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    295s
  • max time network
    358s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 21:15

General

  • Target

    7686f7c935a81e99becc73063b1f2e7075ee7f5da815918a7d829d838e34635e.exe

  • Size

    126KB

  • MD5

    6afd0b18e6a6c7909ab7ee485e5408aa

  • SHA1

    0e46eac952c441ed4505977b46aaa5455d5ca9ff

  • SHA256

    7686f7c935a81e99becc73063b1f2e7075ee7f5da815918a7d829d838e34635e

  • SHA512

    b0a168db9c1b1b5a8f8c969a8e0ce69b6ac07730bcd7a2c1785faa48395fcd193a79487e961cf6d5dd57bf710f37d30e7364fefa8e629423c536b072f671ac91

  • SSDEEP

    3072:RgXdZt9P6D3XJkSN/na4byCXoHF5Tpg5zxoqdRFRsNzQh:Re3499nwLpcxoQXsN2

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7686f7c935a81e99becc73063b1f2e7075ee7f5da815918a7d829d838e34635e.exe
    "C:\Users\Admin\AppData\Local\Temp\7686f7c935a81e99becc73063b1f2e7075ee7f5da815918a7d829d838e34635e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Program Files (x86)\SeStPage\SeStPage.exe
      "C:\Program Files (x86)\SeStPage\SeStPage.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2280
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c \DelUS.bat
      2⤵
        PID:4436

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\DelUS.bat

      Filesize

      264B

      MD5

      590bb6cfed5848174b0e4a87f52cf44a

      SHA1

      2215d2fc080285b9f32f3333994e40de08ffac81

      SHA256

      ebd1edd41954a6dd0b3af13a94400c578952a62a048ee7652c3ac2e2af39d87a

      SHA512

      128fa8a09ee9f3944b3431d1c42b1ba81f9fdf3ae3bd72f0b50ca8563b1ae5e00b099dd5a1a720229c79bc38a9efc1629de2be5f293cb87021917bc0347e4424

    • C:\Program Files (x86)\SeStPage\SeStPage.exe

      Filesize

      368KB

      MD5

      cfed4f02ff21557a607927835b79ee1e

      SHA1

      12de3947cf15e7577cf80a71e17804b2d8374005

      SHA256

      7f1ee53a6b9360a2af9a6ed48b41f679e7efe8e1d0e661307a034889d71c27da

      SHA512

      a4d4579067be659db1caa6578602a361c3f296af80931979740ee7b9eb06e1dec364d8389a0eaffcac1b7dbf95883664b647ef06830a71c599e3c62364c99362

    • C:\Program Files (x86)\SeStPage\SeStPage.exe

      Filesize

      368KB

      MD5

      cfed4f02ff21557a607927835b79ee1e

      SHA1

      12de3947cf15e7577cf80a71e17804b2d8374005

      SHA256

      7f1ee53a6b9360a2af9a6ed48b41f679e7efe8e1d0e661307a034889d71c27da

      SHA512

      a4d4579067be659db1caa6578602a361c3f296af80931979740ee7b9eb06e1dec364d8389a0eaffcac1b7dbf95883664b647ef06830a71c599e3c62364c99362

    • C:\Users\Admin\AppData\Local\Temp\nsz57F6.tmp\SelfDelete.dll

      Filesize

      24KB

      MD5

      7bf1bd7661385621c7908e36958f582e

      SHA1

      43242d7731c097e95fb96753c8262609ff929410

      SHA256

      c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e

      SHA512

      8317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f