Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe
Resource
win10v2004-20221111-en
General
-
Target
d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe
-
Size
69KB
-
MD5
eda59a79f7f553399171be78d22ff55b
-
SHA1
8831899895a494dd6a3b1234dc16d041f95c406f
-
SHA256
d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f
-
SHA512
51a09f9d2643c6023cf9eb491ec74f55bc7e27b4bec3458b336727d80b86f9d1668b3a2724c76332db359c64d602b33ca4f1729eeafe42ba8ec08c7e07a24940
-
SSDEEP
768:/X4pMCtw68NqLqpa9LRn5391N+0PDrEWDw1nlxHLUXljGVCFn:/XsptwGaynT+0PDYWEt/On
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run windows32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run windows32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe -
Executes dropped EXE 3 IoCs
pid Process 1772 windows32.exe 1708 windows32.exe 2000 windows32.exe -
resource yara_rule behavioral1/memory/1036-67-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1036-68-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1036-69-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1036-75-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1036-76-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1036-77-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1036-82-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 1036 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 1036 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 1772 windows32.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunServices\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run windows32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run windows32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce windows32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices windows32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices windows32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce windows32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce windows32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\MicrosoftWindows = "C:\\Users\\Admin\\AppData\\Roaming\\windows32.exe" windows32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce windows32.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1152 set thread context of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 980 set thread context of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 1772 set thread context of 1708 1772 windows32.exe 30 PID 1708 set thread context of 2000 1708 windows32.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://redirecturls.info/" windows32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 1772 windows32.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 1152 wrote to memory of 980 1152 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 27 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 980 wrote to memory of 1036 980 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 28 PID 1036 wrote to memory of 1772 1036 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 29 PID 1036 wrote to memory of 1772 1036 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 29 PID 1036 wrote to memory of 1772 1036 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 29 PID 1036 wrote to memory of 1772 1036 d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe 29 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1772 wrote to memory of 1708 1772 windows32.exe 30 PID 1708 wrote to memory of 2000 1708 windows32.exe 31 PID 1708 wrote to memory of 2000 1708 windows32.exe 31 PID 1708 wrote to memory of 2000 1708 windows32.exe 31 PID 1708 wrote to memory of 2000 1708 windows32.exe 31 PID 1708 wrote to memory of 2000 1708 windows32.exe 31 PID 1708 wrote to memory of 2000 1708 windows32.exe 31 PID 1708 wrote to memory of 2000 1708 windows32.exe 31 PID 1708 wrote to memory of 2000 1708 windows32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe"C:\Users\Admin\AppData\Local\Temp\d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe"C:\Users\Admin\AppData\Local\Temp\d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe"C:\Users\Admin\AppData\Local\Temp\d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Roaming\windows32.exe"C:\Users\Admin\AppData\Roaming\windows32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Roaming\windows32.exe"C:\Users\Admin\AppData\Roaming\windows32.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\windows32.exe"C:\Users\Admin\AppData\Roaming\windows32.exe"6⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer start page
PID:2000
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD525a0e6a2590df6b5edefa0f51d214261
SHA18bbd2395db43b9838626eda00ca0acf6e822b94d
SHA2563b979d97345639f940b7ac6231e25ae41cdaf7f6d851f482f3be4a6aeb8007d6
SHA512c892cea34b5d68c293b8d8e71ad24d8a33094d0a7ca182c7931bc2f0a2c654c134269f3112e2902fa2f18b9c29e1d1288c141928944b0958e198bed941af8afb
-
Filesize
2KB
MD525a0e6a2590df6b5edefa0f51d214261
SHA18bbd2395db43b9838626eda00ca0acf6e822b94d
SHA2563b979d97345639f940b7ac6231e25ae41cdaf7f6d851f482f3be4a6aeb8007d6
SHA512c892cea34b5d68c293b8d8e71ad24d8a33094d0a7ca182c7931bc2f0a2c654c134269f3112e2902fa2f18b9c29e1d1288c141928944b0958e198bed941af8afb
-
Filesize
69KB
MD5eda59a79f7f553399171be78d22ff55b
SHA18831899895a494dd6a3b1234dc16d041f95c406f
SHA256d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f
SHA51251a09f9d2643c6023cf9eb491ec74f55bc7e27b4bec3458b336727d80b86f9d1668b3a2724c76332db359c64d602b33ca4f1729eeafe42ba8ec08c7e07a24940
-
Filesize
69KB
MD5eda59a79f7f553399171be78d22ff55b
SHA18831899895a494dd6a3b1234dc16d041f95c406f
SHA256d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f
SHA51251a09f9d2643c6023cf9eb491ec74f55bc7e27b4bec3458b336727d80b86f9d1668b3a2724c76332db359c64d602b33ca4f1729eeafe42ba8ec08c7e07a24940
-
Filesize
69KB
MD5eda59a79f7f553399171be78d22ff55b
SHA18831899895a494dd6a3b1234dc16d041f95c406f
SHA256d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f
SHA51251a09f9d2643c6023cf9eb491ec74f55bc7e27b4bec3458b336727d80b86f9d1668b3a2724c76332db359c64d602b33ca4f1729eeafe42ba8ec08c7e07a24940
-
Filesize
69KB
MD5eda59a79f7f553399171be78d22ff55b
SHA18831899895a494dd6a3b1234dc16d041f95c406f
SHA256d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f
SHA51251a09f9d2643c6023cf9eb491ec74f55bc7e27b4bec3458b336727d80b86f9d1668b3a2724c76332db359c64d602b33ca4f1729eeafe42ba8ec08c7e07a24940
-
Filesize
2KB
MD525a0e6a2590df6b5edefa0f51d214261
SHA18bbd2395db43b9838626eda00ca0acf6e822b94d
SHA2563b979d97345639f940b7ac6231e25ae41cdaf7f6d851f482f3be4a6aeb8007d6
SHA512c892cea34b5d68c293b8d8e71ad24d8a33094d0a7ca182c7931bc2f0a2c654c134269f3112e2902fa2f18b9c29e1d1288c141928944b0958e198bed941af8afb
-
Filesize
2KB
MD525a0e6a2590df6b5edefa0f51d214261
SHA18bbd2395db43b9838626eda00ca0acf6e822b94d
SHA2563b979d97345639f940b7ac6231e25ae41cdaf7f6d851f482f3be4a6aeb8007d6
SHA512c892cea34b5d68c293b8d8e71ad24d8a33094d0a7ca182c7931bc2f0a2c654c134269f3112e2902fa2f18b9c29e1d1288c141928944b0958e198bed941af8afb
-
Filesize
69KB
MD5eda59a79f7f553399171be78d22ff55b
SHA18831899895a494dd6a3b1234dc16d041f95c406f
SHA256d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f
SHA51251a09f9d2643c6023cf9eb491ec74f55bc7e27b4bec3458b336727d80b86f9d1668b3a2724c76332db359c64d602b33ca4f1729eeafe42ba8ec08c7e07a24940
-
Filesize
69KB
MD5eda59a79f7f553399171be78d22ff55b
SHA18831899895a494dd6a3b1234dc16d041f95c406f
SHA256d87ca8c49214452d1ba2e9693f31130b499acbf1eb7d91aed450439310525f9f
SHA51251a09f9d2643c6023cf9eb491ec74f55bc7e27b4bec3458b336727d80b86f9d1668b3a2724c76332db359c64d602b33ca4f1729eeafe42ba8ec08c7e07a24940