Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    253s
  • max time network
    334s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 09:39

General

  • Target

    a0d6a201ad600de8df5400c1966811cbbe735016aaadc425ab8454295f6096d3.exe

  • Size

    232KB

  • MD5

    771d377461b7a51656c87fb7a172939e

  • SHA1

    821c9253e2c5aaa72c3e77b4d1c33c9423e6a5c3

  • SHA256

    a0d6a201ad600de8df5400c1966811cbbe735016aaadc425ab8454295f6096d3

  • SHA512

    179340e3e922f32d5091fc06d681949e2365fe3ca35d7cbec8557231982c45cc6df5b65efd32e31f8471faf172c80f73bc08136859725444816f2b056a06874d

  • SSDEEP

    6144:QyG03PFKs78vpRTlEqxF6snji81RUinKbLYx:bPhpu

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0d6a201ad600de8df5400c1966811cbbe735016aaadc425ab8454295f6096d3.exe
    "C:\Users\Admin\AppData\Local\Temp\a0d6a201ad600de8df5400c1966811cbbe735016aaadc425ab8454295f6096d3.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Users\Admin\fnriuf.exe
      "C:\Users\Admin\fnriuf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fnriuf.exe

    Filesize

    232KB

    MD5

    8e2e46db66f626a28e01751ab2355941

    SHA1

    190cb53bbdf5671aab584af774cc2ec892e3555b

    SHA256

    8e6d8c0b4740c581cf269dff2328faba6cabcef9745ee46b0d9519024709d165

    SHA512

    96b448a638015a8e627f75b452b2635fcb961161b698c75faeb894c9b3eb38561a336d43b67c126fa07d0bffbab37e59972323eb3527e1d3c2f8abeaf40acfb3

  • C:\Users\Admin\fnriuf.exe

    Filesize

    232KB

    MD5

    8e2e46db66f626a28e01751ab2355941

    SHA1

    190cb53bbdf5671aab584af774cc2ec892e3555b

    SHA256

    8e6d8c0b4740c581cf269dff2328faba6cabcef9745ee46b0d9519024709d165

    SHA512

    96b448a638015a8e627f75b452b2635fcb961161b698c75faeb894c9b3eb38561a336d43b67c126fa07d0bffbab37e59972323eb3527e1d3c2f8abeaf40acfb3

  • \Users\Admin\fnriuf.exe

    Filesize

    232KB

    MD5

    8e2e46db66f626a28e01751ab2355941

    SHA1

    190cb53bbdf5671aab584af774cc2ec892e3555b

    SHA256

    8e6d8c0b4740c581cf269dff2328faba6cabcef9745ee46b0d9519024709d165

    SHA512

    96b448a638015a8e627f75b452b2635fcb961161b698c75faeb894c9b3eb38561a336d43b67c126fa07d0bffbab37e59972323eb3527e1d3c2f8abeaf40acfb3

  • \Users\Admin\fnriuf.exe

    Filesize

    232KB

    MD5

    8e2e46db66f626a28e01751ab2355941

    SHA1

    190cb53bbdf5671aab584af774cc2ec892e3555b

    SHA256

    8e6d8c0b4740c581cf269dff2328faba6cabcef9745ee46b0d9519024709d165

    SHA512

    96b448a638015a8e627f75b452b2635fcb961161b698c75faeb894c9b3eb38561a336d43b67c126fa07d0bffbab37e59972323eb3527e1d3c2f8abeaf40acfb3

  • memory/528-56-0x0000000076931000-0x0000000076933000-memory.dmp

    Filesize

    8KB