Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    236s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 08:43

General

  • Target

    963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe

  • Size

    72KB

  • MD5

    b62ec4686bf4f3ffc203a65b47d7d83c

  • SHA1

    bf596c72aa63fb3a08e90aa43a4eefbeac2eced1

  • SHA256

    963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5

  • SHA512

    ea06aa6ceb21ba1d0f6780394e28d8713076895f3544899ccddcf57b556ade857cc8a1fb5b95041c3359813060fe59e3679c2c6e4e7b1ea96e025fbf73605e9f

  • SSDEEP

    1536:qfWeK0tgc2VVLpffqHjpp19VxRw6QL03L:qfW+tWNpqH1VRPQL03L

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe
    "C:\Users\Admin\AppData\Local\Temp\963570c68c6e070f689343070511e04328f35f2eb36e58a7d33f62fdbdab82e5.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Cmf..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:1452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cmf..bat

    Filesize

    274B

    MD5

    7e7e65554b7d36d90018ff81953fcbf0

    SHA1

    f0ee3346edd5e2eccadf20ac6dc5e0ed9e307e54

    SHA256

    ef4336794625fe3220bd18af085e091e8b542807d28855685884d4fe7e8268e5

    SHA512

    3f707d076f38445e5f1f5b3f99fa216636b81a330260b5fb6d456fa7e975dbac063a3f17e46a96222f996da5d276ce152014340ea5612d9988b3d9ac70ab33f1

  • memory/564-55-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/564-54-0x0000000076D71000-0x0000000076D73000-memory.dmp

    Filesize

    8KB

  • memory/564-56-0x0000000000230000-0x0000000000241000-memory.dmp

    Filesize

    68KB

  • memory/564-57-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/564-58-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/564-60-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB