Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 19:13

General

  • Target

    b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8.exe

  • Size

    172KB

  • MD5

    445772cadc7038a1fc6a6ac9a913eae8

  • SHA1

    a458e77f891e31a3a72602164578cc7441f9b23c

  • SHA256

    b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8

  • SHA512

    d36a45ddc524f79066897de5fa6bdbd39d4db63440e024dc7a29dcbfc9e5d7388d8025ea5682cf6865df8a5678aca6849292d7beed92a25465373ddaa62d4feb

  • SSDEEP

    3072:F6SFonoVD8oSx/mvXAFIFR7Nzim04f1fhLOG7GQiCLMt8Xt/Wv6mgea:F6coUD8oSx/mvXAFIFR7N7DfhhLOG7Gb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8.exe
    "C:\Users\Admin\AppData\Local\Temp\b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\rouze.exe
      "C:\Users\Admin\rouze.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rouze.exe

    Filesize

    172KB

    MD5

    575fa5f9d5e89dbd408f1450f8bbbb51

    SHA1

    83b00d41b364f165c7421c8f5665d816ea269a1c

    SHA256

    a50c9c7ca1abfaf02da8c1823999ec0eb64a88504ad589771ff067fc6780b879

    SHA512

    af956652a5e1bb1c99854f021e6cf3687e31e3e449f0031b6bce71a449b51f8e97411c386ae1d32101d26065acc31d08341d2dffa88d3574581d11f4122fe4b4

  • C:\Users\Admin\rouze.exe

    Filesize

    172KB

    MD5

    575fa5f9d5e89dbd408f1450f8bbbb51

    SHA1

    83b00d41b364f165c7421c8f5665d816ea269a1c

    SHA256

    a50c9c7ca1abfaf02da8c1823999ec0eb64a88504ad589771ff067fc6780b879

    SHA512

    af956652a5e1bb1c99854f021e6cf3687e31e3e449f0031b6bce71a449b51f8e97411c386ae1d32101d26065acc31d08341d2dffa88d3574581d11f4122fe4b4

  • \Users\Admin\rouze.exe

    Filesize

    172KB

    MD5

    575fa5f9d5e89dbd408f1450f8bbbb51

    SHA1

    83b00d41b364f165c7421c8f5665d816ea269a1c

    SHA256

    a50c9c7ca1abfaf02da8c1823999ec0eb64a88504ad589771ff067fc6780b879

    SHA512

    af956652a5e1bb1c99854f021e6cf3687e31e3e449f0031b6bce71a449b51f8e97411c386ae1d32101d26065acc31d08341d2dffa88d3574581d11f4122fe4b4

  • \Users\Admin\rouze.exe

    Filesize

    172KB

    MD5

    575fa5f9d5e89dbd408f1450f8bbbb51

    SHA1

    83b00d41b364f165c7421c8f5665d816ea269a1c

    SHA256

    a50c9c7ca1abfaf02da8c1823999ec0eb64a88504ad589771ff067fc6780b879

    SHA512

    af956652a5e1bb1c99854f021e6cf3687e31e3e449f0031b6bce71a449b51f8e97411c386ae1d32101d26065acc31d08341d2dffa88d3574581d11f4122fe4b4

  • memory/1752-56-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB