Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe
Resource
win10v2004-20220901-en
General
-
Target
7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe
-
Size
241KB
-
MD5
20cf4b44daab3b25c07271bafc38a260
-
SHA1
4fcca608189031fa654f3c34b5e54a51b37b5b07
-
SHA256
7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b
-
SHA512
0234c1ca350a53cbb1565a3d8ae26c50fe40bd420f0bf4df33e334d1db95f639ed2323edd63f8a043be2da3c0afcd61b913249891fa77545eee333f009a400b3
-
SSDEEP
3072:uyAB22qDo7qkXT5J9dWZ8j2/drWfd0PXhphbLeSzBHdHI2hB6JXy4:8BphqkD5X4Z8IoyPjMS7HTy
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\61622 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccapmhvof.cmd" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 680 ftkldteoguhujeotesgzhuhpotesmhot.com 896 ftkldteoguhujeotesgzhuhpotesmhot.com -
Loads dropped DLL 6 IoCs
pid Process 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 680 ftkldteoguhujeotesgzhuhpotesmhot.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1544 set thread context of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 680 set thread context of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccapmhvof.cmd svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:< ftkldteoguhujeotesgzhuhpotesmhot.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 896 ftkldteoguhujeotesgzhuhpotesmhot.com 896 ftkldteoguhujeotesgzhuhpotesmhot.com -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1544 wrote to memory of 1400 1544 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 28 PID 1400 wrote to memory of 680 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 29 PID 1400 wrote to memory of 680 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 29 PID 1400 wrote to memory of 680 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 29 PID 1400 wrote to memory of 680 1400 7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe 29 PID 680 wrote to memory of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 PID 680 wrote to memory of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 PID 680 wrote to memory of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 PID 680 wrote to memory of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 PID 680 wrote to memory of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 PID 680 wrote to memory of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 PID 680 wrote to memory of 896 680 ftkldteoguhujeotesgzhuhpotesmhot.com 30 PID 896 wrote to memory of 1508 896 ftkldteoguhujeotesgzhuhpotesmhot.com 31 PID 896 wrote to memory of 1508 896 ftkldteoguhujeotesgzhuhpotesmhot.com 31 PID 896 wrote to memory of 1508 896 ftkldteoguhujeotesgzhuhpotesmhot.com 31 PID 896 wrote to memory of 1508 896 ftkldteoguhujeotesgzhuhpotesmhot.com 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe"C:\Users\Admin\AppData\Local\Temp\7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe"C:\Users\Admin\AppData\Local\Temp\7ef4fc1d192596b419ba320338f34c129eba80fe81ef4bb0c94fc6beba30178b.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\ftkldteoguhujeotesgzhuhpotesmhot.com"C:\Users\Admin\AppData\Local\Temp\ftkldteoguhujeotesgzhuhpotesmhot.com"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\ftkldteoguhujeotesgzhuhpotesmhot.com"C:\Users\Admin\AppData\Local\Temp\ftkldteoguhujeotesgzhuhpotesmhot.com"4⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1508
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431
-
Filesize
103KB
MD59b88fe317b62e34b232989657dcdc23e
SHA12a95c9be9df29d9b6affa6b84466cfcde4727de4
SHA25691367f6421f1b240bc4e00557e743d738a3d2fcc1d20d066ab07e25e664e64d1
SHA512d16300205a9a17507cc376e26b902459d7d348e1c1fa46cef9e137b712eb0dd92905ce0f0f7556bc4f60a67168610490c1186f351c087bb82a0bb0b7980b9431