Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe
Resource
win10v2004-20221111-en
General
-
Target
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe
-
Size
248KB
-
MD5
7ce76d506a9ce67a304fc407505434ce
-
SHA1
5b1f3545ee9bf9bb0a04819af9c973c989bb0a24
-
SHA256
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5
-
SHA512
c74be949736b1a8fc80d55772474cc5744264abe7186d6ea96e9e75845a8e81d147d5fa99c8cd91a60f2fb6b6b6133c95d955cbb611afdd4cbea2f3676072ba0
-
SSDEEP
3072:5frBXUxghqYaGUe1AK8b/EQk28wlowMmbz1gNNdeHd1fdVcjsQyO1obdmeBnZZk:tVt71U/EQk28wlowbIGysQs5me1Zi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sbpaaj.exe -
Executes dropped EXE 1 IoCs
pid Process 1676 sbpaaj.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /c" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /i" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /v" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /a" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /f" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /e" db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /y" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /r" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /b" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /j" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /l" sbpaaj.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /h" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /x" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /p" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /q" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /z" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /n" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /m" sbpaaj.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /u" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /t" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /d" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /s" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /o" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /g" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /e" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /k" sbpaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbpaaj = "C:\\Users\\Admin\\sbpaaj.exe /w" sbpaaj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe 1676 sbpaaj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 1676 sbpaaj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1676 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 28 PID 1224 wrote to memory of 1676 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 28 PID 1224 wrote to memory of 1676 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 28 PID 1224 wrote to memory of 1676 1224 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe"C:\Users\Admin\AppData\Local\Temp\db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\sbpaaj.exe"C:\Users\Admin\sbpaaj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5b77ed3248ad4694b094e930037936d4b
SHA152506b8ba44a2838e4dd5bad06414f1f2f064fea
SHA2562bcdaf373c9febb5c3f1899337a438688e364e5fb1d16ef223b750a4125e95bf
SHA5124243a2eed17c10628018c9e2f14c0d13b44737fcb2cb1f3dde207ac036a75465faa1f59db6ad9aa470b479def265bdfcb96ff7d8010feae12878a7d89b0b60f5
-
Filesize
248KB
MD5b77ed3248ad4694b094e930037936d4b
SHA152506b8ba44a2838e4dd5bad06414f1f2f064fea
SHA2562bcdaf373c9febb5c3f1899337a438688e364e5fb1d16ef223b750a4125e95bf
SHA5124243a2eed17c10628018c9e2f14c0d13b44737fcb2cb1f3dde207ac036a75465faa1f59db6ad9aa470b479def265bdfcb96ff7d8010feae12878a7d89b0b60f5
-
Filesize
248KB
MD5b77ed3248ad4694b094e930037936d4b
SHA152506b8ba44a2838e4dd5bad06414f1f2f064fea
SHA2562bcdaf373c9febb5c3f1899337a438688e364e5fb1d16ef223b750a4125e95bf
SHA5124243a2eed17c10628018c9e2f14c0d13b44737fcb2cb1f3dde207ac036a75465faa1f59db6ad9aa470b479def265bdfcb96ff7d8010feae12878a7d89b0b60f5
-
Filesize
248KB
MD5b77ed3248ad4694b094e930037936d4b
SHA152506b8ba44a2838e4dd5bad06414f1f2f064fea
SHA2562bcdaf373c9febb5c3f1899337a438688e364e5fb1d16ef223b750a4125e95bf
SHA5124243a2eed17c10628018c9e2f14c0d13b44737fcb2cb1f3dde207ac036a75465faa1f59db6ad9aa470b479def265bdfcb96ff7d8010feae12878a7d89b0b60f5