Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe
Resource
win10v2004-20220812-en
General
-
Target
9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe
-
Size
115KB
-
MD5
9ab704f141a002a06f39b56125347661
-
SHA1
4fb671f7eab79b451a08048fbcd406a5b11b43d9
-
SHA256
9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f
-
SHA512
472365de5f86515d1de534bcde30a6f5a1725ecdfc5b9d329e997e575d07d3823ffe1776fe1acba99dd2f85d17b8fc53839fb7bdf290628429837cc29fa74d46
-
SSDEEP
1536:/b6+xLX1qiIm+JoWrpDji1ccoM34TfZYXTB4jOnG1kwg6MKvqXXGqRlyAox0H1PN:uOLX1+5XJjRM34tYX3TKvqXWYyAv1GBQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 896 se.exe 1276 se.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 896 set thread context of 1276 896 se.exe 28 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\se.exe 9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1276 se.exe 1276 se.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1600 9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1600 wrote to memory of 896 1600 9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe 27 PID 1600 wrote to memory of 896 1600 9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe 27 PID 1600 wrote to memory of 896 1600 9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe 27 PID 1600 wrote to memory of 896 1600 9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe 27 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 896 wrote to memory of 1276 896 se.exe 28 PID 1276 wrote to memory of 1232 1276 se.exe 16 PID 1276 wrote to memory of 1232 1276 se.exe 16 PID 1276 wrote to memory of 1232 1276 se.exe 16 PID 1276 wrote to memory of 1232 1276 se.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe"C:\Users\Admin\AppData\Local\Temp\9865e5182d626fc9129f21c80876f9a370c1f2ea88d266a86daebb30bdbaa46f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\se.exe"C:\Windows\se.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\se.exeC:\Windows\se.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d414d87f33e9511eb144348c8a96ab90
SHA1719863b4c9b4e7f37ef5a1cd067d8b3e18aa0078
SHA2560eb50e6b7edd1919b10869ca564fb4c0aca6f172ed095ccd09ba2bb199eca4fc
SHA51255c35a4864e493254dca8e6ad9a7d7452092c56b9084fd1d8587f766c7b20994ff4936e4d0bdf229af1e4df6e1848c4046fcb8313f6ab84660868d67e6326cba
-
Filesize
83KB
MD5d414d87f33e9511eb144348c8a96ab90
SHA1719863b4c9b4e7f37ef5a1cd067d8b3e18aa0078
SHA2560eb50e6b7edd1919b10869ca564fb4c0aca6f172ed095ccd09ba2bb199eca4fc
SHA51255c35a4864e493254dca8e6ad9a7d7452092c56b9084fd1d8587f766c7b20994ff4936e4d0bdf229af1e4df6e1848c4046fcb8313f6ab84660868d67e6326cba
-
Filesize
83KB
MD5d414d87f33e9511eb144348c8a96ab90
SHA1719863b4c9b4e7f37ef5a1cd067d8b3e18aa0078
SHA2560eb50e6b7edd1919b10869ca564fb4c0aca6f172ed095ccd09ba2bb199eca4fc
SHA51255c35a4864e493254dca8e6ad9a7d7452092c56b9084fd1d8587f766c7b20994ff4936e4d0bdf229af1e4df6e1848c4046fcb8313f6ab84660868d67e6326cba