Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
233s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 01:31 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe
Resource
win10v2004-20221111-en
General
-
Target
b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe
-
Size
255KB
-
MD5
c4c74ebabf935baa19f5e12d3359833e
-
SHA1
82376fb1a9255b1903073622e59bc2c57f641ab2
-
SHA256
b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c
-
SHA512
2c80ed7b1ddf29fa970c3509c2683c3dfa3e077d2a0f5ba093aa7d26dbd45cdf9685907e3a231984789afb1e664c82dac30b70a83ec5c365089bbc8fda861ec3
-
SSDEEP
6144:WjswHa4HKnkvErZCU5Be0VsRoqbxMlm1eRTPDg:Z4HKkvERIKsjDeRvg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1444 keygen.exe 1012 303443_2599185bace0bbd1b9f92e7e3e719737.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 1660 WerFault.exe 1660 WerFault.exe 1660 WerFault.exe 1660 WerFault.exe 1660 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1660 1012 WerFault.exe 29 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe Token: SeIncBasePriorityPrivilege 1444 keygen.exe Token: 33 1444 keygen.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1444 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 28 PID 1244 wrote to memory of 1444 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 28 PID 1244 wrote to memory of 1444 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 28 PID 1244 wrote to memory of 1444 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 28 PID 1244 wrote to memory of 1012 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 29 PID 1244 wrote to memory of 1012 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 29 PID 1244 wrote to memory of 1012 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 29 PID 1244 wrote to memory of 1012 1244 b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe 29 PID 1012 wrote to memory of 1660 1012 303443_2599185bace0bbd1b9f92e7e3e719737.exe 30 PID 1012 wrote to memory of 1660 1012 303443_2599185bace0bbd1b9f92e7e3e719737.exe 30 PID 1012 wrote to memory of 1660 1012 303443_2599185bace0bbd1b9f92e7e3e719737.exe 30 PID 1012 wrote to memory of 1660 1012 303443_2599185bace0bbd1b9f92e7e3e719737.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe"C:\Users\Admin\AppData\Local\Temp\b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Roaming\keygen.exe"C:\Users\Admin\AppData\Roaming\keygen.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe"C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 1043⤵
- Loads dropped DLL
- Program crash
PID:1660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD52599185bace0bbd1b9f92e7e3e719737
SHA136367008a3074d344d2f1e4c457e9c5d4b188a0c
SHA2563449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8
SHA512195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2
-
Filesize
79KB
MD54cab60b6428608b76dbe0f1f12b6cc02
SHA1964922c9cfa4df9059aa2090ccadecd30b8d9d4f
SHA256be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb
SHA5120072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d
-
Filesize
79KB
MD54cab60b6428608b76dbe0f1f12b6cc02
SHA1964922c9cfa4df9059aa2090ccadecd30b8d9d4f
SHA256be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb
SHA5120072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d
-
Filesize
129KB
MD52599185bace0bbd1b9f92e7e3e719737
SHA136367008a3074d344d2f1e4c457e9c5d4b188a0c
SHA2563449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8
SHA512195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2
-
Filesize
129KB
MD52599185bace0bbd1b9f92e7e3e719737
SHA136367008a3074d344d2f1e4c457e9c5d4b188a0c
SHA2563449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8
SHA512195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2
-
Filesize
129KB
MD52599185bace0bbd1b9f92e7e3e719737
SHA136367008a3074d344d2f1e4c457e9c5d4b188a0c
SHA2563449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8
SHA512195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2
-
Filesize
129KB
MD52599185bace0bbd1b9f92e7e3e719737
SHA136367008a3074d344d2f1e4c457e9c5d4b188a0c
SHA2563449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8
SHA512195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2
-
Filesize
129KB
MD52599185bace0bbd1b9f92e7e3e719737
SHA136367008a3074d344d2f1e4c457e9c5d4b188a0c
SHA2563449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8
SHA512195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2
-
Filesize
129KB
MD52599185bace0bbd1b9f92e7e3e719737
SHA136367008a3074d344d2f1e4c457e9c5d4b188a0c
SHA2563449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8
SHA512195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2
-
Filesize
79KB
MD54cab60b6428608b76dbe0f1f12b6cc02
SHA1964922c9cfa4df9059aa2090ccadecd30b8d9d4f
SHA256be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb
SHA5120072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d