Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
Resource
win10v2004-20220812-en
General
-
Target
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
-
Size
89KB
-
MD5
e982f8207670946d5bcc18581caf6e89
-
SHA1
003881e35f529faaa485e42d78ebd889674412cb
-
SHA256
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
-
SHA512
d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
SSDEEP
1536:ARFtqMnrgUfv0L6p326kF3CBg72dxNGgSuoCswHW:AflpECBk23UgSuEw2
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1748 512506946C42AC.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explorer.lnk c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe -
Loads dropped DLL 3 IoCs
pid Process 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 1748 512506946C42AC.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\512506946C42AC = "C:\\ProgramData\\512506946C42AC\\512506946C42AC.exe" c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\512506946C42AC = "C:\\ProgramData\\512506946C42AC\\512506946C42AC.exe" c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1816 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 512506946C42AC.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 512506946C42AC.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 512506946C42AC.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1748 512506946C42AC.exe 1748 512506946C42AC.exe 1748 512506946C42AC.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1748 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 26 PID 1584 wrote to memory of 1748 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 26 PID 1584 wrote to memory of 1748 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 26 PID 1584 wrote to memory of 1748 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 26 PID 1584 wrote to memory of 1748 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 26 PID 1584 wrote to memory of 1748 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 26 PID 1584 wrote to memory of 1748 1584 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 26 PID 1748 wrote to memory of 1816 1748 512506946C42AC.exe 28 PID 1748 wrote to memory of 1816 1748 512506946C42AC.exe 28 PID 1748 wrote to memory of 1816 1748 512506946C42AC.exe 28 PID 1748 wrote to memory of 1816 1748 512506946C42AC.exe 28 PID 1748 wrote to memory of 1816 1748 512506946C42AC.exe 28 PID 1748 wrote to memory of 1816 1748 512506946C42AC.exe 28 PID 1748 wrote to memory of 1816 1748 512506946C42AC.exe 28 PID 1748 wrote to memory of 1640 1748 512506946C42AC.exe 30 PID 1748 wrote to memory of 1640 1748 512506946C42AC.exe 30 PID 1748 wrote to memory of 1640 1748 512506946C42AC.exe 30 PID 1748 wrote to memory of 1640 1748 512506946C42AC.exe 30 PID 1748 wrote to memory of 1640 1748 512506946C42AC.exe 30 PID 1748 wrote to memory of 1640 1748 512506946C42AC.exe 30 PID 1748 wrote to memory of 1640 1748 512506946C42AC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe"C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe"1⤵
- Disables RegEdit via registry modification
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\ProgramData\512506946C42AC\512506946C42AC.exeC:\ProgramData\512506946C42AC\512506946C42AC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns && ipconfig /renew3⤵
- Gathers network information
PID:1816
-
-
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵PID:1640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5e982f8207670946d5bcc18581caf6e89
SHA1003881e35f529faaa485e42d78ebd889674412cb
SHA256c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
SHA512d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
Filesize
89KB
MD5e982f8207670946d5bcc18581caf6e89
SHA1003881e35f529faaa485e42d78ebd889674412cb
SHA256c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
SHA512d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
Filesize
89KB
MD5e982f8207670946d5bcc18581caf6e89
SHA1003881e35f529faaa485e42d78ebd889674412cb
SHA256c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
SHA512d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
Filesize
89KB
MD5e982f8207670946d5bcc18581caf6e89
SHA1003881e35f529faaa485e42d78ebd889674412cb
SHA256c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
SHA512d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
Filesize
3KB
MD5e9032dac10fb27acfa89c3357fad86b3
SHA11623843e0d369c9911989c0730a6470c22dd60fd
SHA2569de0bb4cb8a79f575da4dbc86cedb6a9ef8d94c0b176fd4690b9b7ffee078391
SHA51270e663ad1e87832673f7140aca20dcd3db46c256b91f2924e7a9e1ab24a295d432b625fdcc53b1f3bbc84f91390190e4bd483da5285f95ed0316be09b2b82004