Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    189s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 19:08

General

  • Target

    cc885b5083856bab56d055b4aeadd9537e672245f7dabb0cff0fdb5480a4c491.exe

  • Size

    476KB

  • MD5

    f819a8489b6366921d506dd9214719f3

  • SHA1

    2100bff84d50ff9080ad0b1a01cd388154fb7101

  • SHA256

    cc885b5083856bab56d055b4aeadd9537e672245f7dabb0cff0fdb5480a4c491

  • SHA512

    1c1d9d397d50002de3d741cb968bacea7a15c458e866cbe1b7448480d6bb67c54d9fa0046bc8c380e94af865c9fe592a40d942474ea6048b766b666ce7322018

  • SSDEEP

    12288:QewO7X/Ib9wA1pDdTvSvm3IMSCqNo9XyGgYS6kXX/gUOd:Q4j/Ib9wAzdDv3IMSCqN4XyGgYS6kHSd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc885b5083856bab56d055b4aeadd9537e672245f7dabb0cff0fdb5480a4c491.exe
    "C:\Users\Admin\AppData\Local\Temp\cc885b5083856bab56d055b4aeadd9537e672245f7dabb0cff0fdb5480a4c491.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\taaosis.exe
      "C:\Users\Admin\taaosis.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\taaosis.exe

    Filesize

    476KB

    MD5

    9761dce76491608f08fff69cac3f84f0

    SHA1

    e8e8b8dc89140e506018f0758ffbf1b16e4b9bd3

    SHA256

    0eeb740dd6902dde2d8a2c37edb66dce25d03a6c9a1941610dc57774a336d1ba

    SHA512

    bae6de063cdca56fd1c10542645617c9f52c8c0e1be3895d757a245e611d95d58c775dd15101562fffef6b9744628e83ef142d97019cfb104945a49afdf15b22

  • C:\Users\Admin\taaosis.exe

    Filesize

    476KB

    MD5

    9761dce76491608f08fff69cac3f84f0

    SHA1

    e8e8b8dc89140e506018f0758ffbf1b16e4b9bd3

    SHA256

    0eeb740dd6902dde2d8a2c37edb66dce25d03a6c9a1941610dc57774a336d1ba

    SHA512

    bae6de063cdca56fd1c10542645617c9f52c8c0e1be3895d757a245e611d95d58c775dd15101562fffef6b9744628e83ef142d97019cfb104945a49afdf15b22

  • \Users\Admin\taaosis.exe

    Filesize

    476KB

    MD5

    9761dce76491608f08fff69cac3f84f0

    SHA1

    e8e8b8dc89140e506018f0758ffbf1b16e4b9bd3

    SHA256

    0eeb740dd6902dde2d8a2c37edb66dce25d03a6c9a1941610dc57774a336d1ba

    SHA512

    bae6de063cdca56fd1c10542645617c9f52c8c0e1be3895d757a245e611d95d58c775dd15101562fffef6b9744628e83ef142d97019cfb104945a49afdf15b22

  • \Users\Admin\taaosis.exe

    Filesize

    476KB

    MD5

    9761dce76491608f08fff69cac3f84f0

    SHA1

    e8e8b8dc89140e506018f0758ffbf1b16e4b9bd3

    SHA256

    0eeb740dd6902dde2d8a2c37edb66dce25d03a6c9a1941610dc57774a336d1ba

    SHA512

    bae6de063cdca56fd1c10542645617c9f52c8c0e1be3895d757a245e611d95d58c775dd15101562fffef6b9744628e83ef142d97019cfb104945a49afdf15b22

  • memory/952-56-0x00000000753F1000-0x00000000753F3000-memory.dmp

    Filesize

    8KB