Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe
Resource
win10v2004-20220812-en
General
-
Target
b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe
-
Size
45KB
-
MD5
989d406c0998f63418085f32a3b4b6eb
-
SHA1
11a7088fe7e9bec9ddbffb0bc354cfea26b36e39
-
SHA256
b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71
-
SHA512
771de6770fa8838526c9d7ab84ec051cd138104ece0d7a9cf1984cfba31ceaccf1fb31a7f2fe79cb1733044d5c5547dee856b7319840353d1f6f9343bf3786f1
-
SSDEEP
768:yQJVdwwIyyKYEC1p4Lww98gIZrhZyqHJSS1enFm8v:ymVcy8z89EFpreFBv
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b000000012346-55.dat acprotect -
resource yara_rule behavioral1/files/0x000b000000012346-55.dat upx behavioral1/memory/1112-56-0x0000000010000000-0x0000000010012000-memory.dmp upx behavioral1/memory/1112-58-0x0000000010000000-0x0000000010012000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1596 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\comres.dll b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe File opened for modification C:\Windows\SysWOW64\emHnPuBAaF7XjuXBbdxSg.dll b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\fOnts\WD7eC3pJvgmYQYNwrVP.Ttf b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}\InprocServer32\ = "C:\\Windows\\SysWow64\\emHnPuBAaF7XjuXBbdxSg.dll" b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}\InprocServer32\ThreadingModel = "Apartment" b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}\InprocServer32 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF} b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}\InprocServer32 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe Token: SeDebugPrivilege 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1596 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe 28 PID 1112 wrote to memory of 1596 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe 28 PID 1112 wrote to memory of 1596 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe 28 PID 1112 wrote to memory of 1596 1112 b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe"C:\Users\Admin\AppData\Local\Temp\b00d4ebd7bc399779cad21567d6a21110185f2740b3917114e351a9e1b02bc71.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B00D4E~1.EXE >> NUL2⤵
- Deletes itself
PID:1596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD52380dcbc7215b71f2f57c67a64aa84a0
SHA1311c3a840ac088d43d24416a32c4a670bcc3c9d9
SHA256e90ab7b05c5849d7332cedbc8f9a77f7647153bfa8bb8349181112adfe39246b
SHA51219681981656c5f9c079ad1dc842cecba978e32bc759a5e1d582a23ef6fe8ab6b46e9ec5321e99c7b7f7e5c6b8bf33fb78d1f7fb4440847b86410202624bb668e