Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe
Resource
win10v2004-20220901-en
General
-
Target
8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe
-
Size
372KB
-
MD5
1c98a83d4563755904a3b985550f8fd6
-
SHA1
c9dbed02c802ca059ae5a931fef059b34777c97c
-
SHA256
8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40
-
SHA512
93de5aa007f413a44a6e884d7b7b5ecac042e491ef8f5d17bf33c96eb0483b327143788a49dc455431a8140928404724ee7841f159f644b32bbea6a958d76518
-
SSDEEP
6144:XtYS6ffI73W/1RphmcbZVspZUjHy86tAe730nU0SRVCG:XtYS6ffN3PmcHsPUjHy86tAe730Kv
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\shield 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe File opened for modification C:\Program Files\shield 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Installer\Features 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Installer\Features\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Installer\Products 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Installer\Products\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Installer\Products\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Installer 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\Software 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Installer\Features\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Installer\Products\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Installer\Features\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\USER\.DEFAULT 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe -
Modifies registry class 4 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1FCE3C9A99A5E994CB331E87F28C5F75 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1168 8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe"C:\Users\Admin\AppData\Local\Temp\8608c1e8521df3af145b2556061a3d79b5cfe74a4c4111c83656a818f5d66f40.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1168