Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 11:36

General

  • Target

    5efce78a14dbe10b6787f5bd1f2ad2c2fa17e12d61431b16b13ddfc383304046.exe

  • Size

    140KB

  • MD5

    0d0aac5cc047ede373f422fc60916e00

  • SHA1

    ee482dfaca0b95ba3481f4d1264d0a46907d707a

  • SHA256

    5efce78a14dbe10b6787f5bd1f2ad2c2fa17e12d61431b16b13ddfc383304046

  • SHA512

    ef9e228f0bb876b43bd1430e8c4ae8e11878f8cf8c796a8b2e1598ddc15b44f7e0beb2caec395ed42ee447e5607736e5e62de2e75c91c580f51dadfacf1c0d68

  • SSDEEP

    3072:s2LacOaPAX7EjWafJMgE/2DyRuBzMuDuf3tbFR9EBoPfnvZYn:XLYaI7EjWaLBzMsgJv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5efce78a14dbe10b6787f5bd1f2ad2c2fa17e12d61431b16b13ddfc383304046.exe
    "C:\Users\Admin\AppData\Local\Temp\5efce78a14dbe10b6787f5bd1f2ad2c2fa17e12d61431b16b13ddfc383304046.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\zoeime.exe
      "C:\Users\Admin\zoeime.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zoeime.exe

    Filesize

    140KB

    MD5

    7c6c2793a39a90a637b9baf79bb8d725

    SHA1

    6e6b6c3421b310d4e1f71d3196271b5aa1aec100

    SHA256

    bfd5fba8b0903bc67477db5d6aef9583c7f2a51ce0dccb84a8b5782422070c4d

    SHA512

    c2f65ca82374061eecb24656dc7cbb40933f174fd4a25122e34c48b390e312a9229fceb1a89a7a0db4c8a0ba1cc5a895e959452814f299c2179ee48f895be69a

  • C:\Users\Admin\zoeime.exe

    Filesize

    140KB

    MD5

    7c6c2793a39a90a637b9baf79bb8d725

    SHA1

    6e6b6c3421b310d4e1f71d3196271b5aa1aec100

    SHA256

    bfd5fba8b0903bc67477db5d6aef9583c7f2a51ce0dccb84a8b5782422070c4d

    SHA512

    c2f65ca82374061eecb24656dc7cbb40933f174fd4a25122e34c48b390e312a9229fceb1a89a7a0db4c8a0ba1cc5a895e959452814f299c2179ee48f895be69a

  • \Users\Admin\zoeime.exe

    Filesize

    140KB

    MD5

    7c6c2793a39a90a637b9baf79bb8d725

    SHA1

    6e6b6c3421b310d4e1f71d3196271b5aa1aec100

    SHA256

    bfd5fba8b0903bc67477db5d6aef9583c7f2a51ce0dccb84a8b5782422070c4d

    SHA512

    c2f65ca82374061eecb24656dc7cbb40933f174fd4a25122e34c48b390e312a9229fceb1a89a7a0db4c8a0ba1cc5a895e959452814f299c2179ee48f895be69a

  • \Users\Admin\zoeime.exe

    Filesize

    140KB

    MD5

    7c6c2793a39a90a637b9baf79bb8d725

    SHA1

    6e6b6c3421b310d4e1f71d3196271b5aa1aec100

    SHA256

    bfd5fba8b0903bc67477db5d6aef9583c7f2a51ce0dccb84a8b5782422070c4d

    SHA512

    c2f65ca82374061eecb24656dc7cbb40933f174fd4a25122e34c48b390e312a9229fceb1a89a7a0db4c8a0ba1cc5a895e959452814f299c2179ee48f895be69a

  • memory/1204-56-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB