Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe
Resource
win10v2004-20221111-en
General
-
Target
c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe
-
Size
1.1MB
-
MD5
71cf3251dd8f91988bd95c0e85b8b6ca
-
SHA1
27e52817722ea18a53a9b4dcf8a466d05666b10a
-
SHA256
c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336
-
SHA512
dc4d226405a6d5679b29a927fc8c30934a2904236f3b74c1594b0cd60aebab63e1459eae7ba9b9c96cb78f2bc1c207367d352ece374e3e7057df07e688f7399b
-
SSDEEP
24576:fISkZRaSijyUuPNr7yKNzw9DdkVwF0g+yU8BUZP7jl:fISkLaSiboN3NEnIwzy7jl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 936 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\__tmp_rar_sfx_access_check_7093022 c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File created C:\Windows\svchost.exe c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File opened for modification C:\Windows\svchost.exe c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File created C:\Windows\ts.dll c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File opened for modification C:\Windows\ts.dll c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File created C:\Windows\ts1.dll c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File opened for modification C:\Windows\ts1.dll c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File created C:\Windows\TV.dll c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe File opened for modification C:\Windows\TV.dll c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 936 svchost.exe 936 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1016 wrote to memory of 936 1016 c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe 28 PID 1016 wrote to memory of 936 1016 c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe 28 PID 1016 wrote to memory of 936 1016 c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe 28 PID 1016 wrote to memory of 936 1016 c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe"C:\Users\Admin\AppData\Local\Temp\c763320a868176829242f24e89449db7df8972af2250c9ad895319d06abcd336.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5487fc0841b35860747925942bfb5f1cd
SHA14e6777bcb17c7c8a7780e75868c8978c7c31e680
SHA25672e4cefeac545a6da8d753124a83a92c3e743ea0a2cbcb0596ff085bc3e69ab2
SHA51244d837cf628ab02a87472d33e1e14c93e1f263ba03c91e26b3e06e5e9231cb80557784cdc8dd6aff777f1932952dda72e8968ab331ea0784e133b48f30dca9cd
-
Filesize
4.4MB
MD5487fc0841b35860747925942bfb5f1cd
SHA14e6777bcb17c7c8a7780e75868c8978c7c31e680
SHA25672e4cefeac545a6da8d753124a83a92c3e743ea0a2cbcb0596ff085bc3e69ab2
SHA51244d837cf628ab02a87472d33e1e14c93e1f263ba03c91e26b3e06e5e9231cb80557784cdc8dd6aff777f1932952dda72e8968ab331ea0784e133b48f30dca9cd
-
Filesize
3KB
MD5f9edc8d7adf09dba0b731f5c209b45be
SHA1701cee7abd413510b1172fa1f914fc60fc8914f8
SHA2560d40f792e0c7cc03e586bbdfb69f6a0d82a1253e39975b1f87c5cf6db676e277
SHA5129861f58ca585a5c0be4e1110a63d880d75900e2da3698b0cc3066b2bd486ca128cc30003556f4356b5aec137fd89055b9b724789c9e4ea35bde392aa4e60b3ba
-
Filesize
96KB
MD516ea8b59f4ba4f5a61fe1b8cd6050c94
SHA1d1b6f248a30595b05110c5b693d2c9a6a494c9cf
SHA256531c7fe97c6825b0aa2298fda4d4da836cc4e6028a423b05c55bb6b3669aae5c
SHA5125fb879e60a91743e6f58ee565dfe909a576bd4ea9061ee816746283086ea5df6f2a6bfb5178a99555b73fc86b50c6104bce79c5beec97eef1e7e23cd96c7ccd6