Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 22:52

General

  • Target

    b5561fa02779219e6105dac908090cc541abcacd61fb9ecedcf7909ab2fe0745.exe

  • Size

    240KB

  • MD5

    79515c3a10a780585e845cc58adb30f6

  • SHA1

    7aeb539ce6a22a5bf58a4c880e28c3061dd2a589

  • SHA256

    b5561fa02779219e6105dac908090cc541abcacd61fb9ecedcf7909ab2fe0745

  • SHA512

    846cf1447c94188f68efb0a78db0db34ad06464cb0212b6577e3e9f0849eb738b65dd42ef9de7acd4c584e9df3e41160ac12a304d91cf9bee11f1ba1d5885c3d

  • SSDEEP

    6144:Eq43dwqsNTNEXGlQRayEqxF6snji81RUinKq3aEEDliDfi:EtdQKj3aEEwe

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5561fa02779219e6105dac908090cc541abcacd61fb9ecedcf7909ab2fe0745.exe
    "C:\Users\Admin\AppData\Local\Temp\b5561fa02779219e6105dac908090cc541abcacd61fb9ecedcf7909ab2fe0745.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\veiecum.exe
      "C:\Users\Admin\veiecum.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\veiecum.exe

    Filesize

    240KB

    MD5

    df63cdcfb2795408361c48a612614987

    SHA1

    9bc21366393b5031ce4dfc915eb99b15a8126a87

    SHA256

    7588e4d8f4f606b5808894b807ccdce2f05844e3824c1dcc241979b5cdcd87ac

    SHA512

    54b65326dfeb0c40396a0c3ea8b2d66770d10f59077502311c952802bc0f563508c002dcdd3aa2fd7d149fae4387966ac17f872cf0df10282f76f49dc3665c2f

  • C:\Users\Admin\veiecum.exe

    Filesize

    240KB

    MD5

    df63cdcfb2795408361c48a612614987

    SHA1

    9bc21366393b5031ce4dfc915eb99b15a8126a87

    SHA256

    7588e4d8f4f606b5808894b807ccdce2f05844e3824c1dcc241979b5cdcd87ac

    SHA512

    54b65326dfeb0c40396a0c3ea8b2d66770d10f59077502311c952802bc0f563508c002dcdd3aa2fd7d149fae4387966ac17f872cf0df10282f76f49dc3665c2f

  • \Users\Admin\veiecum.exe

    Filesize

    240KB

    MD5

    df63cdcfb2795408361c48a612614987

    SHA1

    9bc21366393b5031ce4dfc915eb99b15a8126a87

    SHA256

    7588e4d8f4f606b5808894b807ccdce2f05844e3824c1dcc241979b5cdcd87ac

    SHA512

    54b65326dfeb0c40396a0c3ea8b2d66770d10f59077502311c952802bc0f563508c002dcdd3aa2fd7d149fae4387966ac17f872cf0df10282f76f49dc3665c2f

  • \Users\Admin\veiecum.exe

    Filesize

    240KB

    MD5

    df63cdcfb2795408361c48a612614987

    SHA1

    9bc21366393b5031ce4dfc915eb99b15a8126a87

    SHA256

    7588e4d8f4f606b5808894b807ccdce2f05844e3824c1dcc241979b5cdcd87ac

    SHA512

    54b65326dfeb0c40396a0c3ea8b2d66770d10f59077502311c952802bc0f563508c002dcdd3aa2fd7d149fae4387966ac17f872cf0df10282f76f49dc3665c2f

  • memory/2044-56-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB