Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 08:43

General

  • Target

    a01d6d3e03e2a8d9659528e8d1c53761ced2b7d4482abefc538e51682105e6cc.exe

  • Size

    213KB

  • MD5

    e395a4334a1b6b46cb43c19d0e0ef41a

  • SHA1

    0edd21e0de92c4a827cd988fc8a77d61d780a883

  • SHA256

    a01d6d3e03e2a8d9659528e8d1c53761ced2b7d4482abefc538e51682105e6cc

  • SHA512

    1a45f6cfd5ec1d9149684e5be936c8691c7360d27227c320d3360ab80b1473103bf917639bfd43c476b443ef5df2f489dfe103f3f39d86581d4c56ce8f6bc0d9

  • SSDEEP

    3072:WGf6viAIxc9LNyRulW1fyNi2i9sn8SK0qt94kJ+7fno7DFkMO3jF9G:WGuCxciuW1KsvH0q907Q7DF43jF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a01d6d3e03e2a8d9659528e8d1c53761ced2b7d4482abefc538e51682105e6cc.exe
    "C:\Users\Admin\AppData\Local\Temp\a01d6d3e03e2a8d9659528e8d1c53761ced2b7d4482abefc538e51682105e6cc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ycb..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Ycb..bat

    Filesize

    274B

    MD5

    5fcd85ba79588c9cd4a6525235f3fb14

    SHA1

    c57a475bd741168783c99c59fd6400896ad8dd35

    SHA256

    62df36c21a66cdb6b83fab2fb01f02811271832b8c707694782ff9ffc4dceadf

    SHA512

    f7a5854ce9518a16f0bb1a9398d476015467ce764a339519b590f7e34fd34482ec267842e7ee287040dee06c066dae20c8b479d80f47627147f0a053f092070c

  • memory/592-54-0x00000000761E1000-0x00000000761E3000-memory.dmp

    Filesize

    8KB

  • memory/592-55-0x0000000000230000-0x000000000026C000-memory.dmp

    Filesize

    240KB

  • memory/592-56-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/592-57-0x0000000000230000-0x000000000026C000-memory.dmp

    Filesize

    240KB

  • memory/592-58-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/592-60-0x0000000000230000-0x000000000023D000-memory.dmp

    Filesize

    52KB

  • memory/592-61-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB