Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe
Resource
win10v2004-20220812-en
General
-
Target
649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe
-
Size
179KB
-
MD5
8155b71a2e4562b5e682d22f0010bd24
-
SHA1
6a9bc4ae28b678ec766ccc6e1e80bd8e0216f3f5
-
SHA256
649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b
-
SHA512
8966917fa4607935d370704ecab41461615239258419891ae70de086956f86fda693f9070e09da25cff110e51e75806ff92c943c914839f885fe168c4929a65a
-
SSDEEP
3072:X875giexVu7fhrnv6MJQPRu2uuQ6ET31Ap0A+GpMWLHJiFp3:slPex8VuMepBLRLpiz
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1340 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe 1340 regsvr32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1792 649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1792 wrote to memory of 856 1792 649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe 28 PID 1792 wrote to memory of 856 1792 649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe 28 PID 1792 wrote to memory of 856 1792 649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe 28 PID 1792 wrote to memory of 856 1792 649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe 28 PID 856 wrote to memory of 1340 856 cmd.exe 31 PID 856 wrote to memory of 1340 856 cmd.exe 31 PID 856 wrote to memory of 1340 856 cmd.exe 31 PID 856 wrote to memory of 1340 856 cmd.exe 31 PID 856 wrote to memory of 1340 856 cmd.exe 31 PID 856 wrote to memory of 1340 856 cmd.exe 31 PID 856 wrote to memory of 1340 856 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe"C:\Users\Admin\AppData\Local\Temp\649816a62a2ff50cb68d0a9e5a228b3c2b5a02019e02d6239bc240467ed8c03b.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\regsvr32.exe /s "C:\ProgramData\2266\msseedir.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\ProgramData\2266\msseedir.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57cb12175da81309e26bb86cd25c49540
SHA186b7de2a4a84b82ef19e0626b34edda01e46c93d
SHA2563c3c6e8eaccf40b723d6225fdfb58a29e42c8071406bf70ef427c59fae21ea85
SHA51222172711f774a1163e6b25d6c229b925f87d088c0cb494b0c827bd4c6e0d153352048739a2254ce0ea364f45c74710da13a53fa256992feb1f31861bdc8d4631
-
Filesize
92KB
MD57cb12175da81309e26bb86cd25c49540
SHA186b7de2a4a84b82ef19e0626b34edda01e46c93d
SHA2563c3c6e8eaccf40b723d6225fdfb58a29e42c8071406bf70ef427c59fae21ea85
SHA51222172711f774a1163e6b25d6c229b925f87d088c0cb494b0c827bd4c6e0d153352048739a2254ce0ea364f45c74710da13a53fa256992feb1f31861bdc8d4631