Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe
Resource
win10v2004-20220812-en
General
-
Target
90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe
-
Size
153KB
-
MD5
c53ae0066fe74a0b3b8f0066a4438bd4
-
SHA1
10ad4a20b752f78306e2c60ba7903480ebed1323
-
SHA256
90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f
-
SHA512
787f21cb7656f52db32001aafbc0b2f4f4105d31b4b4c6050ddcdd73a0839bb74e47c8a2b38d6701487ef581b25d5249fafda9d486d83d63a423e484f0a92be1
-
SSDEEP
3072:yBAp5XhKpN4eOyVTGfhEClj8jTk+0hAdYq0:BbXE9OiTGfhEClq9BdC
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1736 WScript.exe 4 1736 WScript.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\arhivd\insalld\gemoroi.txt 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe File opened for modification C:\Program Files (x86)\arhivd\insalld\shaibu.bat 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe File opened for modification C:\Program Files (x86)\arhivd\insalld\lovi.vbs 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1200 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 27 PID 1324 wrote to memory of 1200 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 27 PID 1324 wrote to memory of 1200 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 27 PID 1324 wrote to memory of 1200 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 27 PID 1324 wrote to memory of 1736 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 29 PID 1324 wrote to memory of 1736 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 29 PID 1324 wrote to memory of 1736 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 29 PID 1324 wrote to memory of 1736 1324 90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe"C:\Users\Admin\AppData\Local\Temp\90dab12fe7f1384f91001f83711e553a4c515c8252148752d94fa0510dbdc76f.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\arhivd\insalld\shaibu.bat" "2⤵
- Drops file in Drivers directory
PID:1200
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\arhivd\insalld\lovi.vbs"2⤵
- Blocklisted process makes network request
PID:1736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD54420279662574754dfd5bef14ee49b5b
SHA164dedbd9276bbcf8e2f2e42d81288d073d930892
SHA25686ddeccd15c9bffccf0ab2b7f7ec3a40b0ba1ce8356317624bea66a0e20c2aa1
SHA512952c16e86e009f6726250b4e5ab5e4a5b7a41da3247ab82b88580d246f018f34791c06d345230e7dad388021616f149e458b5bcf5993ecdcae6135b6dc33de99
-
Filesize
1KB
MD58935d2c18286235595a63a129970dd3d
SHA14459381028d33dd5ac3a22f4f7ce80acdab8fccb
SHA2564a76452cd02a58c7ff97c447a287a8e39f5ec072c7b59b11196e99c0e075da9a
SHA512b7bf8da3ac8fb5bda0b9c892dca2396b6cc27b8cd766e5076bc5047762e4e3f865aabfb7a1d3f108d4e84524c7afdb7322dfe593baffe9518dac160505b60204
-
Filesize
4KB
MD573307829bd885e1a2aa590043be39660
SHA124f3f175249d32da7cf9e3d8c0403da036b9ecc7
SHA256a548727c1e25e767ec537c64d6dc1581344777f6e86f924cde6a450a35327660
SHA5122b64c28c7378d666827aa1a7659d20d03327e589443065cc72d101442147c48cff8d93863364367515293c264b5146d8f329f2bcd08d8078a570f3c1ec8bcc5a