Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:02
Behavioral task
behavioral1
Sample
f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe
Resource
win10v2004-20220812-en
General
-
Target
f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe
-
Size
20KB
-
MD5
9096288e39894ed94911e40c9fe36784
-
SHA1
670631575c12ab63492bd126b5f9377852dc5760
-
SHA256
f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900
-
SHA512
a18d84884c538f9190545d0609fb703e460ef585a57d35cf5e5fd797cf0a348c96a33ee912a6162b142e9727a33fc5da9465f647cef1840671cadb64f1977c9b
-
SSDEEP
384:vdaoCh/DyUqQG4t/esFLurnIIO/o3IVIzBmCZpadyjNQ+wAtSOv6c7p4N:vko6GFJ4t7ZurnIIO/o4IzoepadyBfj+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\system32\drivers\etc\hîsts WScript.exe -
resource yara_rule behavioral1/memory/1928-55-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 272 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Updater.lnk WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1300 reg.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1168 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 27 PID 1928 wrote to memory of 1168 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 27 PID 1928 wrote to memory of 1168 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 27 PID 1928 wrote to memory of 1168 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 27 PID 1928 wrote to memory of 1240 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 29 PID 1928 wrote to memory of 1240 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 29 PID 1928 wrote to memory of 1240 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 29 PID 1928 wrote to memory of 1240 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 29 PID 1168 wrote to memory of 1300 1168 cmd.exe 31 PID 1168 wrote to memory of 1300 1168 cmd.exe 31 PID 1168 wrote to memory of 1300 1168 cmd.exe 31 PID 1168 wrote to memory of 1300 1168 cmd.exe 31 PID 1240 wrote to memory of 1216 1240 cmd.exe 32 PID 1240 wrote to memory of 1216 1240 cmd.exe 32 PID 1240 wrote to memory of 1216 1240 cmd.exe 32 PID 1240 wrote to memory of 1216 1240 cmd.exe 32 PID 1928 wrote to memory of 272 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 33 PID 1928 wrote to memory of 272 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 33 PID 1928 wrote to memory of 272 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 33 PID 1928 wrote to memory of 272 1928 f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe"C:\Users\Admin\AppData\Local\Temp\f7aeae30288e4c7ba8a5b569a072a242667ef5406f9050997b3c690871d3a900.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:1300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d 000000000000000003000000000037e00000540000000000 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d 000000000000000003000000000037e00000540000000000 /f3⤵PID:1216
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\checkexp.vbs"2⤵
- Drops file in Drivers directory
- Deletes itself
- Drops startup file
PID:272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59a621b4e12abd6a409fd201a63d45ef8
SHA147800a3c4688ee3a8aea6a289bd0b41065c8b3e4
SHA2565d32897638bce331d8c441b9bdfb762ad9a6734dd5a230d5b67330cb2537f061
SHA5129e194233af9955a20501c21b25f2e6777530136c0ab5767c7897ce3b545e89300ba6ab28959ccbe76a284033fd15d9ae53fea0158296157e48461c7d0d38a84c
-
Filesize
769B
MD545954f9078276becd94b3e723803279f
SHA148fe4b9e46f989e26263e420041f3a9d1a1dfeb7
SHA25686ab20e8a8167fbb13f9fe5456fa9bd7d72315bb342c184d2f38b64aaef102d1
SHA512a1df12ed9975dfe5ec3d1b2e337e8c13f954dd6497541d2b388764036ddfae84f3ab2634996da2ae0c697e8e7728db73a847064ac94575d4c203cde635ad23c5