Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe
Resource
win10v2004-20220812-en
General
-
Target
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe
-
Size
33KB
-
MD5
72d83b61847efab6d09999506a4d7a18
-
SHA1
408dcace71fed3d6ec7c8f628ec84cbdebd7e108
-
SHA256
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec
-
SHA512
5d7b86aa56f2c1491bff40bb8e8c0180727f65ecf86785a25fc03cfd33cd655364743bc322357072eeca9e25ec8832466291172339dfd16376fcc92550044e33
-
SSDEEP
768:BDtodNkDnNQqajgp5yWmeF6qQ4wRbx6nV:BR9DnNQqacJmeF7gbx6nV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1344 Win8.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 548 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3406813a45cf8bdcd106619234d16e2b.exe Win8.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3406813a45cf8bdcd106619234d16e2b.exe Win8.exe -
Loads dropped DLL 1 IoCs
pid Process 960 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\3406813a45cf8bdcd106619234d16e2b = "\"C:\\Users\\Admin\\AppData\\Roaming\\Win8.exe\" .." Win8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3406813a45cf8bdcd106619234d16e2b = "\"C:\\Users\\Admin\\AppData\\Roaming\\Win8.exe\" .." Win8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1344 Win8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1344 Win8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 960 wrote to memory of 1344 960 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe 27 PID 960 wrote to memory of 1344 960 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe 27 PID 960 wrote to memory of 1344 960 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe 27 PID 960 wrote to memory of 1344 960 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe 27 PID 1344 wrote to memory of 548 1344 Win8.exe 28 PID 1344 wrote to memory of 548 1344 Win8.exe 28 PID 1344 wrote to memory of 548 1344 Win8.exe 28 PID 1344 wrote to memory of 548 1344 Win8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe"C:\Users\Admin\AppData\Local\Temp\ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\Win8.exe"C:\Users\Admin\AppData\Roaming\Win8.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Win8.exe" "Win8.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:548
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD572d83b61847efab6d09999506a4d7a18
SHA1408dcace71fed3d6ec7c8f628ec84cbdebd7e108
SHA256ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec
SHA5125d7b86aa56f2c1491bff40bb8e8c0180727f65ecf86785a25fc03cfd33cd655364743bc322357072eeca9e25ec8832466291172339dfd16376fcc92550044e33
-
Filesize
33KB
MD572d83b61847efab6d09999506a4d7a18
SHA1408dcace71fed3d6ec7c8f628ec84cbdebd7e108
SHA256ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec
SHA5125d7b86aa56f2c1491bff40bb8e8c0180727f65ecf86785a25fc03cfd33cd655364743bc322357072eeca9e25ec8832466291172339dfd16376fcc92550044e33
-
Filesize
33KB
MD572d83b61847efab6d09999506a4d7a18
SHA1408dcace71fed3d6ec7c8f628ec84cbdebd7e108
SHA256ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec
SHA5125d7b86aa56f2c1491bff40bb8e8c0180727f65ecf86785a25fc03cfd33cd655364743bc322357072eeca9e25ec8832466291172339dfd16376fcc92550044e33