Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    233s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 01:31 UTC

General

  • Target

    b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe

  • Size

    255KB

  • MD5

    c4c74ebabf935baa19f5e12d3359833e

  • SHA1

    82376fb1a9255b1903073622e59bc2c57f641ab2

  • SHA256

    b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c

  • SHA512

    2c80ed7b1ddf29fa970c3509c2683c3dfa3e077d2a0f5ba093aa7d26dbd45cdf9685907e3a231984789afb1e664c82dac30b70a83ec5c365089bbc8fda861ec3

  • SSDEEP

    6144:WjswHa4HKnkvErZCU5Be0VsRoqbxMlm1eRTPDg:Z4HKkvERIKsjDeRvg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe
    "C:\Users\Admin\AppData\Local\Temp\b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Roaming\keygen.exe
      "C:\Users\Admin\AppData\Roaming\keygen.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1444
    • C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe
      "C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 104
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

    Filesize

    129KB

    MD5

    2599185bace0bbd1b9f92e7e3e719737

    SHA1

    36367008a3074d344d2f1e4c457e9c5d4b188a0c

    SHA256

    3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

    SHA512

    195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

  • C:\Users\Admin\AppData\Roaming\keygen.exe

    Filesize

    79KB

    MD5

    4cab60b6428608b76dbe0f1f12b6cc02

    SHA1

    964922c9cfa4df9059aa2090ccadecd30b8d9d4f

    SHA256

    be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb

    SHA512

    0072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d

  • C:\Users\Admin\AppData\Roaming\keygen.exe

    Filesize

    79KB

    MD5

    4cab60b6428608b76dbe0f1f12b6cc02

    SHA1

    964922c9cfa4df9059aa2090ccadecd30b8d9d4f

    SHA256

    be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb

    SHA512

    0072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d

  • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

    Filesize

    129KB

    MD5

    2599185bace0bbd1b9f92e7e3e719737

    SHA1

    36367008a3074d344d2f1e4c457e9c5d4b188a0c

    SHA256

    3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

    SHA512

    195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

  • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

    Filesize

    129KB

    MD5

    2599185bace0bbd1b9f92e7e3e719737

    SHA1

    36367008a3074d344d2f1e4c457e9c5d4b188a0c

    SHA256

    3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

    SHA512

    195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

  • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

    Filesize

    129KB

    MD5

    2599185bace0bbd1b9f92e7e3e719737

    SHA1

    36367008a3074d344d2f1e4c457e9c5d4b188a0c

    SHA256

    3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

    SHA512

    195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

  • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

    Filesize

    129KB

    MD5

    2599185bace0bbd1b9f92e7e3e719737

    SHA1

    36367008a3074d344d2f1e4c457e9c5d4b188a0c

    SHA256

    3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

    SHA512

    195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

  • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

    Filesize

    129KB

    MD5

    2599185bace0bbd1b9f92e7e3e719737

    SHA1

    36367008a3074d344d2f1e4c457e9c5d4b188a0c

    SHA256

    3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

    SHA512

    195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

  • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

    Filesize

    129KB

    MD5

    2599185bace0bbd1b9f92e7e3e719737

    SHA1

    36367008a3074d344d2f1e4c457e9c5d4b188a0c

    SHA256

    3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

    SHA512

    195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

  • \Users\Admin\AppData\Roaming\keygen.exe

    Filesize

    79KB

    MD5

    4cab60b6428608b76dbe0f1f12b6cc02

    SHA1

    964922c9cfa4df9059aa2090ccadecd30b8d9d4f

    SHA256

    be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb

    SHA512

    0072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d

  • memory/1012-71-0x0000000000230000-0x000000000024E000-memory.dmp

    Filesize

    120KB

  • memory/1012-74-0x0000000000230000-0x000000000024E000-memory.dmp

    Filesize

    120KB

  • memory/1244-56-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/1444-65-0x000007FEF3490000-0x000007FEF3EB3000-memory.dmp

    Filesize

    10.1MB

  • memory/1444-73-0x000007FEF1D10000-0x000007FEF2DA6000-memory.dmp

    Filesize

    16.6MB

  • memory/1444-75-0x0000000002016000-0x0000000002035000-memory.dmp

    Filesize

    124KB

  • memory/1444-76-0x0000000002016000-0x0000000002035000-memory.dmp

    Filesize

    124KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.