Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    170s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 23:46

General

  • Target

    a5040f3bf79a7bb249c930f0a97ca947d2cf7e499f1493ec9351decefef7ff65.exe

  • Size

    141KB

  • MD5

    3f6d9c8db25f4a2b3797927b2a58cece

  • SHA1

    68e5997f8d7551e156f41971e3bc86d3fa80642e

  • SHA256

    a5040f3bf79a7bb249c930f0a97ca947d2cf7e499f1493ec9351decefef7ff65

  • SHA512

    e3ab723fbdb2bd8824763cb2030c3b5a0182c62d40734e3ec6946082dedf151966222dd55019928f94e270ccb83872ed389c96a3c65448e81d6559004d9d20d5

  • SSDEEP

    3072:RZGAPBUo2hUE+6c4AUH7tSH2zZuYiMTkISJyeu8o:nxZUoqUE+6chUZSH2zZu4AIlU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5040f3bf79a7bb249c930f0a97ca947d2cf7e499f1493ec9351decefef7ff65.exe
    "C:\Users\Admin\AppData\Local\Temp\a5040f3bf79a7bb249c930f0a97ca947d2cf7e499f1493ec9351decefef7ff65.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=vsd3g0h_vs0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:268 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bf33330c6bde02fdb4edb31ebad85db

    SHA1

    e1e0ffd3f2e491c1e87512d9c417f6d834833ae7

    SHA256

    d502793f037436edc287638c2a2732da36577544cdcec668a3a8945c1f9bee99

    SHA512

    1a55b20e825134c6b5603a2ed06922c0543572c8858fcbfada78c904d049bafe27c340565095da235cab703206e8067f8aac09727840fbc13142efc69a6911c4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    1KB

    MD5

    5e182e1bcc71a29782275cb3c7649cc9

    SHA1

    26c98ec6c0a0838c79eca196d2026253f5ef5f88

    SHA256

    3121cbcd50f78eaaf944a830ebd5c3ddaa45b0af74fe1295d918960ec462c811

    SHA512

    12d1bce72af4f210910d3898ef9505ec3efb718e2f8a3deba991016754ebf6a442ec555e00f8380ccadb46a3a66bbd438959b631f14af1c5ab4a6ec8d6812adc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I1GDIW2L.txt

    Filesize

    601B

    MD5

    ce076a6fb1accc2d6f3337816be1e0a5

    SHA1

    aa68bc85d1adf7f7eda3ebfd5023f4ef7bbe8ee1

    SHA256

    09afc285888f2816b4a5ccf8b20880c596e61a6ba062f8965cf6f15263c744ea

    SHA512

    3c800dc3b80e7b534e0a5f7ba1ef4b95cb12b2f1a65ec16c0da26095150fa314a75e83c9de7baafc7a59e95c877e9798c7ab275f8c6ae9b493c8fcb9b9ba7c1b

  • memory/2028-54-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2028-55-0x0000000000310000-0x0000000000356000-memory.dmp

    Filesize

    280KB

  • memory/2028-58-0x00000000767F1000-0x00000000767F3000-memory.dmp

    Filesize

    8KB

  • memory/2028-60-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2028-61-0x0000000000310000-0x0000000000356000-memory.dmp

    Filesize

    280KB