Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 18:34

General

  • Target

    b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe

  • Size

    64KB

  • MD5

    edf92f3f42d6cb634254b384c8c214de

  • SHA1

    18d42a714fa8a1fd2178e762ea8f5a02a4ec88f2

  • SHA256

    b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6

  • SHA512

    263af274f7133527bf2f44d786851a827c3d3091a76cd8310fde9d559fe1bc22eab870cfdf9ecef0b3644f8639d1912fc8374dc82a30e4a0d24a8e2463eaa6e6

  • SSDEEP

    768:6/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLh:6RsvcdcQjosnvnZ6LQ1Eh

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe
    "C:\Users\Admin\AppData\Local\Temp\b8aa601a8170430b2aa72e1cf172041089a673972ec16a2ea4c43168ececdaf6.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Program Files (x86)\Java\jre-09\bin\jusched.exe
      "C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Java\jre-09\bin\jusched.exe

    Filesize

    64KB

    MD5

    a8b9a4bdccccd5f3fb13f3ab35c14297

    SHA1

    d8fb8584cd33b90c3a4c0cfda9e5968197590eef

    SHA256

    b34df58cdfc7e9a149c5284ee4427e9bc33e3e6dfda1b678b2de828d85080b2f

    SHA512

    25e533a41d534f1256db2d9ccbbea6fb193609982f63c1c0f0eab72bbfb2128b1f84f26ea180e7d6d3c1ab4f19eca8e381a18c43509b5c679ea7709a463cf788

  • \Program Files (x86)\Java\jre-09\bin\jusched.exe

    Filesize

    64KB

    MD5

    a8b9a4bdccccd5f3fb13f3ab35c14297

    SHA1

    d8fb8584cd33b90c3a4c0cfda9e5968197590eef

    SHA256

    b34df58cdfc7e9a149c5284ee4427e9bc33e3e6dfda1b678b2de828d85080b2f

    SHA512

    25e533a41d534f1256db2d9ccbbea6fb193609982f63c1c0f0eab72bbfb2128b1f84f26ea180e7d6d3c1ab4f19eca8e381a18c43509b5c679ea7709a463cf788

  • \Program Files (x86)\Java\jre-09\bin\jusched.exe

    Filesize

    64KB

    MD5

    a8b9a4bdccccd5f3fb13f3ab35c14297

    SHA1

    d8fb8584cd33b90c3a4c0cfda9e5968197590eef

    SHA256

    b34df58cdfc7e9a149c5284ee4427e9bc33e3e6dfda1b678b2de828d85080b2f

    SHA512

    25e533a41d534f1256db2d9ccbbea6fb193609982f63c1c0f0eab72bbfb2128b1f84f26ea180e7d6d3c1ab4f19eca8e381a18c43509b5c679ea7709a463cf788

  • memory/1008-54-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1008-55-0x0000000075C51000-0x0000000075C53000-memory.dmp

    Filesize

    8KB

  • memory/1008-60-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1656-61-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1656-63-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB