Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 07:44

General

  • Target

    ab0701c1749a772533308206f51b7ca233bfe6231a37d9d7af779ea37a4f9e1e.exe

  • Size

    22.4MB

  • MD5

    0c0958afa2f46d9617a9fd6ab7468bb8

  • SHA1

    0771c861a7bdc702397766e7fc7c2c0e1315bbd8

  • SHA256

    ab0701c1749a772533308206f51b7ca233bfe6231a37d9d7af779ea37a4f9e1e

  • SHA512

    7540571207bda3123c01688ae1779c272638a1d3698aa4a2f1dbe0c90ef4eaf1e0d2d3178c6cd255bf6736af3840d76f8aeef3b081e1b958891a3ecd17ff6a5a

  • SSDEEP

    49152:ZMk2fdATU8bAz6JKRR86gulWpeWmenMj0yzPaxrTCy58e6FjBL:ZMy+O6NlIeWmbj5rapCY56Fjt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0701c1749a772533308206f51b7ca233bfe6231a37d9d7af779ea37a4f9e1e.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0701c1749a772533308206f51b7ca233bfe6231a37d9d7af779ea37a4f9e1e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\Net.exe
      Net Stop PcaSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 Stop PcaSvc
        3⤵
          PID:1116
      • C:\Users\Admin\AppData\Local\Temp\g88759\vsafe_setup.exe
        C:\Users\Admin\AppData\Local\Temp\g88759\vsafe_setup.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1036

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\g88759\vsafe_setup.exe

      Filesize

      500KB

      MD5

      80acfba01b15107fb95a61131dc8a4f2

      SHA1

      605caa2f5754a5c2427e15c7f4d604c309671750

      SHA256

      2021a9bb1862e2f7b80fca93ada4e65a858c6acdde38fbccfa6dc6d3d676deec

      SHA512

      71cfb13c470f48c3bac14132788e75f0d62428acd69854d9d9f8556a52f52f8716b73912b4f58bc8c93efcc4f6da582b6259848996692147269f19559aa59207

    • C:\Users\Admin\AppData\Local\Temp\g88759\vsafe_setup.exe

      Filesize

      500KB

      MD5

      80acfba01b15107fb95a61131dc8a4f2

      SHA1

      605caa2f5754a5c2427e15c7f4d604c309671750

      SHA256

      2021a9bb1862e2f7b80fca93ada4e65a858c6acdde38fbccfa6dc6d3d676deec

      SHA512

      71cfb13c470f48c3bac14132788e75f0d62428acd69854d9d9f8556a52f52f8716b73912b4f58bc8c93efcc4f6da582b6259848996692147269f19559aa59207

    • \Users\Admin\AppData\Local\Temp\g88759\vsafe_setup.exe

      Filesize

      500KB

      MD5

      80acfba01b15107fb95a61131dc8a4f2

      SHA1

      605caa2f5754a5c2427e15c7f4d604c309671750

      SHA256

      2021a9bb1862e2f7b80fca93ada4e65a858c6acdde38fbccfa6dc6d3d676deec

      SHA512

      71cfb13c470f48c3bac14132788e75f0d62428acd69854d9d9f8556a52f52f8716b73912b4f58bc8c93efcc4f6da582b6259848996692147269f19559aa59207

    • \Users\Admin\AppData\Local\Temp\g88759\vsafe_setup.exe

      Filesize

      500KB

      MD5

      80acfba01b15107fb95a61131dc8a4f2

      SHA1

      605caa2f5754a5c2427e15c7f4d604c309671750

      SHA256

      2021a9bb1862e2f7b80fca93ada4e65a858c6acdde38fbccfa6dc6d3d676deec

      SHA512

      71cfb13c470f48c3bac14132788e75f0d62428acd69854d9d9f8556a52f52f8716b73912b4f58bc8c93efcc4f6da582b6259848996692147269f19559aa59207

    • \Users\Admin\AppData\Local\Temp\g88759\vsafe_setup.exe

      Filesize

      500KB

      MD5

      80acfba01b15107fb95a61131dc8a4f2

      SHA1

      605caa2f5754a5c2427e15c7f4d604c309671750

      SHA256

      2021a9bb1862e2f7b80fca93ada4e65a858c6acdde38fbccfa6dc6d3d676deec

      SHA512

      71cfb13c470f48c3bac14132788e75f0d62428acd69854d9d9f8556a52f52f8716b73912b4f58bc8c93efcc4f6da582b6259848996692147269f19559aa59207

    • memory/1628-54-0x0000000076201000-0x0000000076203000-memory.dmp

      Filesize

      8KB