Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 23:58
Behavioral task
behavioral1
Sample
c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe
Resource
win10v2004-20221111-en
General
-
Target
c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe
-
Size
141KB
-
MD5
199a2d76ce2930cdc60fe37c419de749
-
SHA1
d521c0d8160bfa91c76c7fb9c9735c4156ab0859
-
SHA256
c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315
-
SHA512
29eb1a0567c46a06a37bd2ed571275ff7e013456050287b39fa70e52e8d668d792e4dd7d843f1089d09c0bd3713eab28a77cec9247e61a163bbb7c785035fd98
-
SSDEEP
3072:Y7nmcSp5MJ4jEltN/WvaR4NSBxdYPTAyGAN0O4JY1MK:YzmD5MJVd/WvaWNixdY7MBWuK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe\"" c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2020-55-0x0000000000400000-0x0000000000D64000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1588 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1588 taskkill.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1588 2020 c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe 26 PID 2020 wrote to memory of 1588 2020 c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe 26 PID 2020 wrote to memory of 1588 2020 c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe 26 PID 2020 wrote to memory of 1588 2020 c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe"C:\Users\Admin\AppData\Local\Temp\c815a13e1aa44be2c3c55c358799eef48edfc97efe7846fee339f4abf0e6d315.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1588
-