Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe
Resource
win10v2004-20221111-en
General
-
Target
c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe
-
Size
137KB
-
MD5
12c807fa6c04c98dc8d3787801654731
-
SHA1
c0c806246277dfd7fd8b1531a0c826ce22b2d96f
-
SHA256
c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5
-
SHA512
9f9df6baae822bf867ac527220ea499ee887b008dde8257ee2310c6fbd0b7c6e33045ab2cdb88ff75abf7f6063f3190e56b55b721667841d946bc85118ee9016
-
SSDEEP
768:Jc588yB1RnUHXYuyBpVRFOrqpp1l1jKdfeRw7C9pWQNScYFWobO93JupQesBBk:Js4B1RpVRwrcl8dD5MnYTOFJxB
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2004 wrote to memory of 944 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 28 PID 2004 wrote to memory of 944 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 28 PID 2004 wrote to memory of 944 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 28 PID 2004 wrote to memory of 944 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 28 PID 2004 wrote to memory of 432 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 30 PID 2004 wrote to memory of 432 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 30 PID 2004 wrote to memory of 432 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 30 PID 2004 wrote to memory of 432 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 30 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 2004 wrote to memory of 1312 2004 c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe 32 PID 944 wrote to memory of 1520 944 net.exe 34 PID 944 wrote to memory of 1520 944 net.exe 34 PID 944 wrote to memory of 1520 944 net.exe 34 PID 944 wrote to memory of 1520 944 net.exe 34 PID 432 wrote to memory of 688 432 net.exe 33 PID 432 wrote to memory of 688 432 net.exe 33 PID 432 wrote to memory of 688 432 net.exe 33 PID 432 wrote to memory of 688 432 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe"C:\Users\Admin\AppData\Local\Temp\c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵PID:1520
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:688
-
-
-
C:\Users\Admin\AppData\Local\Temp\c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe"C:\Users\Admin\AppData\Local\Temp\c7c198b18ede68171f8eca6ca2087ff41b57912e16a71ab8dec23dbf67ea50c5.exe"2⤵PID:1312
-