Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    80s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 08:32

General

  • Target

    b2fcde8b80e8e07cf1ac3afa5e110dc0d67556ff583771b73874b9422afa4c24.exe

  • Size

    407KB

  • MD5

    06392177fb86322b250e730563ad0b12

  • SHA1

    af8888959e3d0edf9d69717664babc99ddaac859

  • SHA256

    b2fcde8b80e8e07cf1ac3afa5e110dc0d67556ff583771b73874b9422afa4c24

  • SHA512

    7f17449ce1725a237afba7e6f53bb83c38a91edf9b0caeeb3e2782f92d25b1af4051f9051d5bc8a79779a6721c5c726cfa9717162155fe01207d7679860d3a0c

  • SSDEEP

    6144:TkE8FSh4HT7d2PojIvSdBo9zMeBmwRiU3bPP0N1vbm6Hq12IYI:ZX/5a2d7iU3b0y1Z

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2fcde8b80e8e07cf1ac3afa5e110dc0d67556ff583771b73874b9422afa4c24.exe
    "C:\Users\Admin\AppData\Local\Temp\b2fcde8b80e8e07cf1ac3afa5e110dc0d67556ff583771b73874b9422afa4c24.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\b2fcde8b80e8e07cf1ac3afa5e110dc0d67556ff583771b73874b9422afa4c24.exe
      C:\Users\Admin\AppData\Local\Temp\b2fcde8b80e8e07cf1ac3afa5e110dc0d67556ff583771b73874b9422afa4c24.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=b2fcde8b80e8e07cf1ac3afa5e110dc0d67556ff583771b73874b9422afa4c24.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AHSY1RSG.txt

    Filesize

    608B

    MD5

    5c603484f6dfbd32039d40fd29a8c0ca

    SHA1

    4db76eb03b63d4ec25aa01633e8c3988b67b089a

    SHA256

    647bb3bb97b6e47e6e85502f6212f46ecd86daafd7c0bc8d412f77466c72c22f

    SHA512

    65ed7f4f1e7bdd8da17c9f476ba722c56f305377a5722f474f3ca446229ae8954325fc6b7590b9f8dec99fe6e03d885cd4e333937d5dcbe7e9447429d3e9b30a

  • memory/2032-54-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2032-55-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2032-57-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2032-58-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2032-60-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2032-61-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2032-65-0x0000000000402000-0x000000000043D800-memory.dmp

    Filesize

    238KB

  • memory/2032-64-0x0000000000402000-0x000000000043D800-memory.dmp

    Filesize

    238KB

  • memory/2032-66-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB