Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:49

General

  • Target

    2398a99d8766354950191ce026b6f8033c76b13492b6d60918ac877a52db37bf.exe

  • Size

    264KB

  • MD5

    fe731c79b7e8c7aa78295389bf6388f9

  • SHA1

    588f8cfb72604bce9dc73a0ed8db91fbffe7d042

  • SHA256

    2398a99d8766354950191ce026b6f8033c76b13492b6d60918ac877a52db37bf

  • SHA512

    a240fb4a44c8ec8eb43b0d3ae7df259a6e21aef0076683e4f8994fe52259b626ce74c682377566430fccd1d4b5304fc30d752f6a13691dfb07adf10dfdc22c93

  • SSDEEP

    3072:Gv3KfbT7o0CX1xZnMIYS3EQqG+vfK5SbwyMtvb0vOkuCE/H/MZpOSKemKmD:/Wnk+qG+vfK5Gwy+Yvwfa25D

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2398a99d8766354950191ce026b6f8033c76b13492b6d60918ac877a52db37bf.exe
    "C:\Users\Admin\AppData\Local\Temp\2398a99d8766354950191ce026b6f8033c76b13492b6d60918ac877a52db37bf.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\jeenau.exe
      "C:\Users\Admin\jeenau.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jeenau.exe

    Filesize

    264KB

    MD5

    e01607303ecb8723039c213e2abf57a6

    SHA1

    7b588e6bb926017ff831f0fb9a633ef86762f2c8

    SHA256

    1a3d319bc761b8444d367b2035e61a7db2338889833d4e321cfd2ab52bbc007f

    SHA512

    ff715ba11561040f1646fefc73df57e619a7846c1a2aca95315f789ff3ba6946756c51a47cf6d5e282ec1d3f7f33507a5247dfed8b28f53fb74f495e9257cd38

  • C:\Users\Admin\jeenau.exe

    Filesize

    264KB

    MD5

    e01607303ecb8723039c213e2abf57a6

    SHA1

    7b588e6bb926017ff831f0fb9a633ef86762f2c8

    SHA256

    1a3d319bc761b8444d367b2035e61a7db2338889833d4e321cfd2ab52bbc007f

    SHA512

    ff715ba11561040f1646fefc73df57e619a7846c1a2aca95315f789ff3ba6946756c51a47cf6d5e282ec1d3f7f33507a5247dfed8b28f53fb74f495e9257cd38

  • \Users\Admin\jeenau.exe

    Filesize

    264KB

    MD5

    e01607303ecb8723039c213e2abf57a6

    SHA1

    7b588e6bb926017ff831f0fb9a633ef86762f2c8

    SHA256

    1a3d319bc761b8444d367b2035e61a7db2338889833d4e321cfd2ab52bbc007f

    SHA512

    ff715ba11561040f1646fefc73df57e619a7846c1a2aca95315f789ff3ba6946756c51a47cf6d5e282ec1d3f7f33507a5247dfed8b28f53fb74f495e9257cd38

  • \Users\Admin\jeenau.exe

    Filesize

    264KB

    MD5

    e01607303ecb8723039c213e2abf57a6

    SHA1

    7b588e6bb926017ff831f0fb9a633ef86762f2c8

    SHA256

    1a3d319bc761b8444d367b2035e61a7db2338889833d4e321cfd2ab52bbc007f

    SHA512

    ff715ba11561040f1646fefc73df57e619a7846c1a2aca95315f789ff3ba6946756c51a47cf6d5e282ec1d3f7f33507a5247dfed8b28f53fb74f495e9257cd38

  • memory/1932-56-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB