Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    107s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 05:46

General

  • Target

    cb7a2ca31d804f40c9066d7d95a9e4720e1a1cf18ce11c6eac3cc5ebbde5cc29.exe

  • Size

    3.5MB

  • MD5

    2f405c0ebfc93ee6f97d25b7142010cf

  • SHA1

    76bf27320efffa815527a0a358efa391a381379d

  • SHA256

    cb7a2ca31d804f40c9066d7d95a9e4720e1a1cf18ce11c6eac3cc5ebbde5cc29

  • SHA512

    a352ed0bbc0d9e8e0f263ac20975e6339c55082fa8c102c6ea896d24c2fabddab1a329d2ed2e95e7d829f9ccba561a207ff3cfe83a71575151acc854f13391f4

  • SSDEEP

    98304:ylAtWDvPNZgZzZe4CRc68l9AZAALTLo98:mAoDXN8zQ4l68l9AZAAc98

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb7a2ca31d804f40c9066d7d95a9e4720e1a1cf18ce11c6eac3cc5ebbde5cc29.exe
    "C:\Users\Admin\AppData\Local\Temp\cb7a2ca31d804f40c9066d7d95a9e4720e1a1cf18ce11c6eac3cc5ebbde5cc29.exe"
    1⤵
    • Sets service image path in registry
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\SysWOW64\Net.exe
      Net Stop PcaSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 Stop PcaSvc
        3⤵
          PID:1972
      • C:\Users\Admin\AppData\Local\Temp\g8FAC4\Security.Task.Manager.v1.7f.Multilingual.exe
        C:\Users\Admin\AppData\Local\Temp\g8FAC4\Security.Task.Manager.v1.7f.Multilingual.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1276
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      59a3c0af4db39f22524fd46f4f768d03

      SHA1

      036a678ff074bc60893549c741d1f4d034a1ffd6

      SHA256

      45985ecd454639a630f92f149fb59409b987df6d1d5e9409adf8165fd96160d4

      SHA512

      60c956648e0ac77fe1b2b338c74e505293f064ab0b7805c39d0458e5dd7bef66ad5479b98679ab0c35ba9cc61ab4797ba88e3745b2c843f981887a72229126bf

    • C:\Users\Admin\AppData\Local\Temp\g8FAC4\Security.Task.Manager.v1.7f.Multilingual.exe

      Filesize

      1.7MB

      MD5

      f104a5404b802a065610842ec754c459

      SHA1

      7ab73e19008eb661f22af083d6c4d3ecc7644adc

      SHA256

      89f4463cf3012145faeeda5df2461e2de2513687a14842028d66d3b60beec717

      SHA512

      df942b1cb8eef7ebed6dc2560f85d5b1d887fcbfa53787d86a5e97ec2c4c6c5c72162a8e8fc6bf29bf7aa2687d3e32e9b587e0286a9e584ad076446090bbd4c8

    • C:\Users\Admin\AppData\Local\Temp\g8FAC4\Security.Task.Manager.v1.7f.Multilingual.exe

      Filesize

      1.7MB

      MD5

      f104a5404b802a065610842ec754c459

      SHA1

      7ab73e19008eb661f22af083d6c4d3ecc7644adc

      SHA256

      89f4463cf3012145faeeda5df2461e2de2513687a14842028d66d3b60beec717

      SHA512

      df942b1cb8eef7ebed6dc2560f85d5b1d887fcbfa53787d86a5e97ec2c4c6c5c72162a8e8fc6bf29bf7aa2687d3e32e9b587e0286a9e584ad076446090bbd4c8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3EUQ2O85.txt

      Filesize

      603B

      MD5

      1b5174296b83b7f5203aaef16b9c3e05

      SHA1

      6205c549dbcdfdc7f1dcc4514344225c8eb6022b

      SHA256

      333e8f3f36d24be1067f2a9da7326421a88c94c2b491a23be99d4dd9249c5fe7

      SHA512

      d6714c5edc1dbcd1713d29ceabd3ea14a76dd8682d85dc0b8e5871b9c161e13b12619c2fb988f41c9920adf710e6597585f511c54f667ce16a96b29df3e90ef3

    • \Users\Admin\AppData\Local\Temp\g8FAC4\Security.Task.Manager.v1.7f.Multilingual.exe

      Filesize

      1.7MB

      MD5

      f104a5404b802a065610842ec754c459

      SHA1

      7ab73e19008eb661f22af083d6c4d3ecc7644adc

      SHA256

      89f4463cf3012145faeeda5df2461e2de2513687a14842028d66d3b60beec717

      SHA512

      df942b1cb8eef7ebed6dc2560f85d5b1d887fcbfa53787d86a5e97ec2c4c6c5c72162a8e8fc6bf29bf7aa2687d3e32e9b587e0286a9e584ad076446090bbd4c8

    • \Users\Admin\AppData\Local\Temp\g8FAC4\Security.Task.Manager.v1.7f.Multilingual.exe

      Filesize

      1.7MB

      MD5

      f104a5404b802a065610842ec754c459

      SHA1

      7ab73e19008eb661f22af083d6c4d3ecc7644adc

      SHA256

      89f4463cf3012145faeeda5df2461e2de2513687a14842028d66d3b60beec717

      SHA512

      df942b1cb8eef7ebed6dc2560f85d5b1d887fcbfa53787d86a5e97ec2c4c6c5c72162a8e8fc6bf29bf7aa2687d3e32e9b587e0286a9e584ad076446090bbd4c8

    • \Users\Admin\AppData\Local\Temp\g8FAC4\Security.Task.Manager.v1.7f.Multilingual.exe

      Filesize

      1.7MB

      MD5

      f104a5404b802a065610842ec754c459

      SHA1

      7ab73e19008eb661f22af083d6c4d3ecc7644adc

      SHA256

      89f4463cf3012145faeeda5df2461e2de2513687a14842028d66d3b60beec717

      SHA512

      df942b1cb8eef7ebed6dc2560f85d5b1d887fcbfa53787d86a5e97ec2c4c6c5c72162a8e8fc6bf29bf7aa2687d3e32e9b587e0286a9e584ad076446090bbd4c8

    • memory/1052-54-0x0000000075931000-0x0000000075933000-memory.dmp

      Filesize

      8KB