Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
236s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe
Resource
win10v2004-20220812-en
General
-
Target
963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe
-
Size
72KB
-
MD5
b62ec4686bf4f3ffc203a65b47d7d83c
-
SHA1
bf596c72aa63fb3a08e90aa43a4eefbeac2eced1
-
SHA256
963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5
-
SHA512
ea06aa6ceb21ba1d0f6780394e28d8713076895f3544899ccddcf57b556ade857cc8a1fb5b95041c3359813060fe59e3679c2c6e4e7b1ea96e025fbf73605e9f
-
SSDEEP
1536:qfWeK0tgc2VVLpffqHjpp19VxRw6QL03L:qfW+tWNpqH1VRPQL03L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1452 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 564 963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 564 wrote to memory of 1452 564 963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe 28 PID 564 wrote to memory of 1452 564 963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe 28 PID 564 wrote to memory of 1452 564 963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe 28 PID 564 wrote to memory of 1452 564 963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe"C:\Users\Admin\AppData\Local\Temp\963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Cmf..bat" > nul 2> nul2⤵
- Deletes itself
PID:1452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD57e7e65554b7d36d90018ff81953fcbf0
SHA1f0ee3346edd5e2eccadf20ac6dc5e0ed9e307e54
SHA256ef4336794625fe3220bd18af085e091e8b542807d28855685884d4fe7e8268e5
SHA5123f707d076f38445e5f1f5b3f99fa216636b81a330260b5fb6d456fa7e975dbac063a3f17e46a96222f996da5d276ce152014340ea5612d9988b3d9ac70ab33f1