Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 07:42

General

  • Target

    a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe

  • Size

    137KB

  • MD5

    0b20e0c3e0b1fcdbf35bc033dd925a00

  • SHA1

    2d4ad10bd65c99bbbfc9e7f44c7a4bcf0518f495

  • SHA256

    a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657

  • SHA512

    e238996860308474a8e3de8f27bf76fe77b46348245ab001533ab1686f99a4c31e415a203bc7ebe63a1723b428c15143e4203fcf2f069e49d92d2399534b4b77

  • SSDEEP

    3072:nDYhPk5Hb4QXTiKZ7dYaATMl3FoFBZkIKz0RDx/Eqk1e:ng85HsyTiKPUMtOfmIR5O

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe
    "C:\Users\Admin\AppData\Local\Temp\a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=gOO_UqzEc5Y
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6909551ac23bad5befd87587b8590e45

    SHA1

    3b3829cebf57eaf635fcb53eed972043ae2b2499

    SHA256

    caa44346af626f4c5245664dd0ce506690270085e421ce7e8257b7ed41d8e7ec

    SHA512

    234cbf8ff17640639898698333b7c4ffd310c79e478b30792366790f3e3dbf84cdd4b8ecb2b10873c280788842a4471e0a4e7309334e85880a80727cb5ea2f44

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    1KB

    MD5

    4ab06742266a7fcab894755d914a0ae3

    SHA1

    51ec733c8b58ef6dd8af5fd59e0b2786a0e20213

    SHA256

    87a032f02968252c14c71d90412910ef14d65b826e7142bc351830e21b3d68d9

    SHA512

    ef2cb78bb8992d6cd2d891613edfa6c096125f8e02832af7468d9273bb49b4ca2737a1497a18d4e178f12f2a18ef6ad434f3db375951e1dd63d05111c41febc6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PG6F5OWX.txt

    Filesize

    608B

    MD5

    509dfae3688b917d381e1be442e69ddf

    SHA1

    8f56906556e8734c85e3a1e66508acb3ad5e1707

    SHA256

    00eb88908073a07d8c1a75d9a7f63ea3a55c0b00e931a8bc96e8f0c5e609583d

    SHA512

    cddf125812d0ca1fa4abf6317e27c026478747acfa1c59a21b2f76275f83883de076004474d09695d57be7279192b4c5e5caa8b5af90edd436081f9bc151d88b

  • memory/1368-54-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/1368-55-0x0000000000310000-0x0000000000356000-memory.dmp

    Filesize

    280KB

  • memory/1368-58-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/1368-59-0x0000000000310000-0x0000000000356000-memory.dmp

    Filesize

    280KB

  • memory/1368-61-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB