Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
Resource
win10v2004-20220812-en
General
-
Target
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
-
Size
100KB
-
MD5
147ce0ded445871a4a62657ddf0941e0
-
SHA1
021ec9503d8180eb0faf192e7f88d0af9f6160ef
-
SHA256
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e
-
SHA512
1e16bcc0d0920fa48b3a489f285026351659eb996b4dce2953c9051a99783098cb102fda6f9f7bdfbe667e410f7bc1e61533ffde11953bbad51a8d74f8fab802
-
SSDEEP
3072:2RH2rkC8TSNFBucXFeBD+4jyhD88FidqaU0KO:Meu4MBTl8Fi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1124 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 876 wrote to memory of 1124 876 fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe 28 PID 876 wrote to memory of 1124 876 fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe 28 PID 876 wrote to memory of 1124 876 fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe 28 PID 876 wrote to memory of 1124 876 fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe"C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Dsv..bat" > nul 2> nul2⤵
- Deletes itself
PID:1124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD543af6a9ef4d8cfdb432b31aadb925fe4
SHA1e815c9538cf85de6814c49edc6629b56a909d2a1
SHA256844d26edd436d1e5baa12063eb02c4f93aff7a2712a0c493e042898aaef44c73
SHA5120854ce97be41b70ffb08de4abcd065692163da83364db14563c035d59f97fc473b7a6bc5850bb0f9b4d6dc3a3c8501328bad34bdda04aa926203cdc090a03ca2