Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe
Resource
win10v2004-20221111-en
General
-
Target
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe
-
Size
4.0MB
-
MD5
a8341dcc887476e5bcaf18994b73db3f
-
SHA1
10b4f9765b3dce8ac29725c80ff40287a4fcd256
-
SHA256
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b
-
SHA512
e053996e562cf8da95ec3eb54354d16b1fb4e0af71161875c1e48fcf40a0a5f92b9b4f14d9426c6ad103f9433595e6e5d65369f4614527203babd5c1fa25c1a8
-
SSDEEP
49152:367KrK1i9AT7+/Nb+TnHOOsqzTRZt6GGNk1trAQ46jQYI3tNkXQGOPPJxP6wVFyV:xArskLpZMhlL2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 960 1756 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 960 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 960 1756 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 27 PID 1756 wrote to memory of 960 1756 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 27 PID 1756 wrote to memory of 960 1756 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 27 PID 1756 wrote to memory of 960 1756 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 27 PID 1756 wrote to memory of 960 1756 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 27 PID 1756 wrote to memory of 960 1756 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:960
-