Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe
Resource
win10v2004-20220901-en
General
-
Target
6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe
-
Size
305KB
-
MD5
dd8041b7f98365e5d0ed9ca2b4c0ef67
-
SHA1
c44c4ca27526fb42ec81bcbd12b16f7cdf4ae0a9
-
SHA256
6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad
-
SHA512
c23036641b8db721c26ca555d6ea035dcc4cd57b699ddbd10b58f00c8b149482fb5e09b1fa260ec70bb01647095bca9d47561ce076e5602b18702b779418ee64
-
SSDEEP
6144:pCtaA012+adiR5L9Q0J9ZShi08S50tI5vBX1WOjKh9FUUCjtx:8T01dZrL9Q0fZtCYIr8jUUCj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1080 tvngweu.exe -
Deletes itself 1 IoCs
pid Process 2020 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 cmd.exe 2020 cmd.exe 1080 tvngweu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1944 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1332 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1080 tvngweu.exe 1080 tvngweu.exe 1080 tvngweu.exe 1080 tvngweu.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1080 tvngweu.exe 1080 tvngweu.exe 1080 tvngweu.exe 1080 tvngweu.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2020 1612 6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe 26 PID 1612 wrote to memory of 2020 1612 6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe 26 PID 1612 wrote to memory of 2020 1612 6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe 26 PID 1612 wrote to memory of 2020 1612 6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe 26 PID 2020 wrote to memory of 1944 2020 cmd.exe 28 PID 2020 wrote to memory of 1944 2020 cmd.exe 28 PID 2020 wrote to memory of 1944 2020 cmd.exe 28 PID 2020 wrote to memory of 1944 2020 cmd.exe 28 PID 2020 wrote to memory of 1332 2020 cmd.exe 30 PID 2020 wrote to memory of 1332 2020 cmd.exe 30 PID 2020 wrote to memory of 1332 2020 cmd.exe 30 PID 2020 wrote to memory of 1332 2020 cmd.exe 30 PID 2020 wrote to memory of 1080 2020 cmd.exe 31 PID 2020 wrote to memory of 1080 2020 cmd.exe 31 PID 2020 wrote to memory of 1080 2020 cmd.exe 31 PID 2020 wrote to memory of 1080 2020 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe"C:\Users\Admin\AppData\Local\Temp\6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1612 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad.exe" & start C:\Users\Admin\AppData\Local\tvngweu.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 16123⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1332
-
-
C:\Users\Admin\AppData\Local\tvngweu.exeC:\Users\Admin\AppData\Local\tvngweu.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1080
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD5dd8041b7f98365e5d0ed9ca2b4c0ef67
SHA1c44c4ca27526fb42ec81bcbd12b16f7cdf4ae0a9
SHA2566f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad
SHA512c23036641b8db721c26ca555d6ea035dcc4cd57b699ddbd10b58f00c8b149482fb5e09b1fa260ec70bb01647095bca9d47561ce076e5602b18702b779418ee64
-
Filesize
305KB
MD5dd8041b7f98365e5d0ed9ca2b4c0ef67
SHA1c44c4ca27526fb42ec81bcbd12b16f7cdf4ae0a9
SHA2566f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad
SHA512c23036641b8db721c26ca555d6ea035dcc4cd57b699ddbd10b58f00c8b149482fb5e09b1fa260ec70bb01647095bca9d47561ce076e5602b18702b779418ee64
-
Filesize
305KB
MD5dd8041b7f98365e5d0ed9ca2b4c0ef67
SHA1c44c4ca27526fb42ec81bcbd12b16f7cdf4ae0a9
SHA2566f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad
SHA512c23036641b8db721c26ca555d6ea035dcc4cd57b699ddbd10b58f00c8b149482fb5e09b1fa260ec70bb01647095bca9d47561ce076e5602b18702b779418ee64
-
Filesize
305KB
MD5dd8041b7f98365e5d0ed9ca2b4c0ef67
SHA1c44c4ca27526fb42ec81bcbd12b16f7cdf4ae0a9
SHA2566f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad
SHA512c23036641b8db721c26ca555d6ea035dcc4cd57b699ddbd10b58f00c8b149482fb5e09b1fa260ec70bb01647095bca9d47561ce076e5602b18702b779418ee64
-
Filesize
305KB
MD5dd8041b7f98365e5d0ed9ca2b4c0ef67
SHA1c44c4ca27526fb42ec81bcbd12b16f7cdf4ae0a9
SHA2566f62fd7c555d8d5bfb3b286fa91ee90897e1017d4cc20577cbd0c104f62c83ad
SHA512c23036641b8db721c26ca555d6ea035dcc4cd57b699ddbd10b58f00c8b149482fb5e09b1fa260ec70bb01647095bca9d47561ce076e5602b18702b779418ee64