Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 18:26

General

  • Target

    54df29f1f4f7f20c2b963b58b4ea25928123b8f68ab040fdbf8d4852535ee024.exe

  • Size

    836KB

  • MD5

    83ecba294e7e30467f9aae0397175b81

  • SHA1

    441a86c928101e3441ab2ae8e8e62e173b0b3d00

  • SHA256

    54df29f1f4f7f20c2b963b58b4ea25928123b8f68ab040fdbf8d4852535ee024

  • SHA512

    d2ca39863a65a4e3eff42c660285337b0ae32543ef3c863226f1d1b5212ced2ea51ca40261c0174edd13e8922ef8bb8c6fc9cd2911230dac2bd2bdc48d5864e3

  • SSDEEP

    24576:qKVsmm/LW+VAtm5no1KRGmsVRM2wpnd8gQj:DY/LnA62KRG7VRT0dEj

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54df29f1f4f7f20c2b963b58b4ea25928123b8f68ab040fdbf8d4852535ee024.exe
    "C:\Users\Admin\AppData\Local\Temp\54df29f1f4f7f20c2b963b58b4ea25928123b8f68ab040fdbf8d4852535ee024.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://synboz.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a155a16ca74bd2e67f30c6ff458f7a4

    SHA1

    658655c09ed4793aee12a2cb79397362e5f7adab

    SHA256

    cce00d7c5e55a5381569123b2be3bf303e25aa0632637e4d1fef28d593ce7cee

    SHA512

    21f33cd31a2d5dbf8ed1e6c72b3a7f6ed922e9aaecc6c21d46a277fa86b7981550dbce82d317a3d0985f2a175d03ba95710841dcb5a8a7299e797ca214e23027

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33217eac443a6466b7e2d455b0165ab7

    SHA1

    a4f8d465c2e31c594b48ccf6003373aa610498cf

    SHA256

    ba813f4f28404f758c574f3e3cf9d9b3e571831993abeebc36724e86140dccd4

    SHA512

    74ce9e6c7398678b68f6cd93ca80011f90f4cbc3cc03b7a4f607b5ffdd5d5849c6bfe8ad87e8aff0fe532f6cc2f84464b1b73752e5ffb6e182b5e1b2034da2ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0de41286b249cc1b31aea2b89c84c5ec

    SHA1

    04e5c6105097ad01fd8748f861b8fc4b2474bd05

    SHA256

    c12910cf52c8bd9535bb1b32f363a3d99b686026ad19e509325243e7df262a2c

    SHA512

    9818d469b644b10207c4d2e52a90b47ea2c74f3131b3a5718f1c7c97fd905bff7d66848f5adb4523166494539e9f836fe8df36785357538edfca72790c3ef3a2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5RO18MCT.txt

    Filesize

    601B

    MD5

    c22d3329a2aced59a8e129b750aafb43

    SHA1

    4de098fcab25f5186d50b4892fe5fb3512e901e6

    SHA256

    2698aefd1d539109a68a9c65c3ce9d22bff3287824786dfcc1497c1b635ca49f

    SHA512

    9c7775097c928a9aa43e801e4c39839ab51e5646df3cab3c81a1bfdaf1fff6f1c97c57b69e42d763299c661806a4b8da5fe08f7d9baaca800cf7762c234ae314

  • memory/1316-54-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1316-55-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1316-58-0x0000000075531000-0x0000000075533000-memory.dmp

    Filesize

    8KB

  • memory/1316-59-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1316-60-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1316-61-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB