Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe
Resource
win7-20220812-en
General
-
Target
ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe
-
Size
24KB
-
MD5
f52dd568afdf3ab27817d849162a3e71
-
SHA1
815da8ca05870e6e77fc387195c14f4119c6787e
-
SHA256
ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f
-
SHA512
c225f68bdc52d4ef60c67a7a8996a032e10fa0b4cc3c8add27ce6b9b6671fd7c5ed02d7c290522c6f277b0dc71bdd47ad2959061dbd2c4c1e90b92f9267a4bb4
-
SSDEEP
384:vOCaqrpMsc29ZpvyF73t+15raYhLoe0qHUEE9FQhVNLqvW:vOCNNyFA15raYhL/HUEE9FQhVB5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1656 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1172 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 28 PID 1212 wrote to memory of 1172 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 28 PID 1212 wrote to memory of 1172 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 28 PID 1212 wrote to memory of 1172 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 28 PID 1212 wrote to memory of 1724 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 30 PID 1212 wrote to memory of 1724 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 30 PID 1212 wrote to memory of 1724 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 30 PID 1212 wrote to memory of 1724 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 30 PID 1212 wrote to memory of 1656 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 32 PID 1212 wrote to memory of 1656 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 32 PID 1212 wrote to memory of 1656 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 32 PID 1212 wrote to memory of 1656 1212 ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe"C:\Users\Admin\AppData\Local\Temp\ff280de1b7694c27f0a10c973f46454e802cd7900bd3e749fcc111e54d784f7f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RenUS.bat" "2⤵PID:1172
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RenUS.bat" "2⤵PID:1724
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DelUS.bat" "2⤵
- Deletes itself
PID:1656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD578008a1ade1c64cc49fc30db329953ae
SHA1b2dac4d1d13639b517e2418c12ae50e08d890377
SHA25659637557fe90736a4bf146498c78088f4927185be78fbe3255eca2172bdb15b7
SHA51273b789234cb9664d9be528e590fe3a5297e9b4efad9d6eaab405a514ad05ba1f60f0260ad1ffda26d407a23f5eb7842b5c70fcb33f7a3174dc9a668e274735f6
-
Filesize
29B
MD54ea69b1b1647ed114f3198e58a889eea
SHA1ef470ae3411c368c43762dfebc7d898c4a47a49f
SHA25643def0cf84cf12cac102e88a19daf4d1bd195a0e98976ad79ddf277f1942bb67
SHA512f9cc1096a981382cc401e819d24d8253d4fd5221cf794a77b726dea15dffb8c5a9d8fa9971ff118b8bfaf7c272f6c94e866035de8f3f6bdafcad2c3f12c260d2
-
Filesize
61B
MD5a5db51d0d0584926dd2aea91dff988f0
SHA1884c3fd1973be99cea73ef6fcc6f04f38a1751df
SHA2561d49dd4b3f059547f18c491c7bfa03a3bc45ae015932ab76c8b11103dee72841
SHA512085506265424268943107f1c2a03ce8b8bf9fd9fc9f12b93780f39afa39d7f38f4d2f7a7b035a447c31d568144f1893ee9b9f3c5b864ecd4915dc6cbbebb9228