Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe
Resource
win10v2004-20221111-en
General
-
Target
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe
-
Size
28KB
-
MD5
cf30cadcc6f0c10f10a0419fda865327
-
SHA1
7ebf460c9a5eab25a80916921c3c86009f4228f3
-
SHA256
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b
-
SHA512
4dd39a99c1098e5bc4be69c735f4ef5109c7eee7359a409e4e46e7bb40a843d50c5a3f16ce4615c250056473553a2dc92baf350a38759cd1b96e143312fe5cfa
-
SSDEEP
384:tO7wbQPHeUNqrQJdZWUheXM9US61RtDw4nUbQC+:tOxHnfFwzXB4+
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\tempeje.exe ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe File opened for modification C:\Windows\tempfile.jpg ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe File created C:\Windows\battemp.bat ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 1284 reg.exe 1236 reg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 544 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1104 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1788 1104 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe 29 PID 1104 wrote to memory of 1788 1104 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe 29 PID 1104 wrote to memory of 1788 1104 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe 29 PID 1104 wrote to memory of 1788 1104 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe 29 PID 1788 wrote to memory of 1236 1788 cmd.exe 31 PID 1788 wrote to memory of 1236 1788 cmd.exe 31 PID 1788 wrote to memory of 1236 1788 cmd.exe 31 PID 1788 wrote to memory of 1236 1788 cmd.exe 31 PID 1788 wrote to memory of 1284 1788 cmd.exe 32 PID 1788 wrote to memory of 1284 1788 cmd.exe 32 PID 1788 wrote to memory of 1284 1788 cmd.exe 32 PID 1788 wrote to memory of 1284 1788 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe"C:\Users\Admin\AppData\Local\Temp\ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\battemp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /F3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:1236
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /F3⤵
- Modifies registry key
PID:1284
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD58214bcaa0c917e60f9bbef8b865f0f26
SHA1340946ae2b1ebf7ec45f7884488af5004f4b9f0f
SHA2564cd9ce47757c0a2a3d750e96c1abb1f5dbba5301c73c4b29416248cb2c9e39f0
SHA512bfe80e6376edfb115c1fa96e704c5ef4e7c0a6baec83531ba96eb1cc0cb09e5355254cd2882241dd1e527121105ec26b8d9d2241ffa4872a331f4ebbacb464ff