Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe
Resource
win10v2004-20221111-en
General
-
Target
caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe
-
Size
631KB
-
MD5
d725941c68aa42f628dbe1097b6cd733
-
SHA1
af9ee4eef4d176f2c71ddf83841a2f1c2ae3aded
-
SHA256
caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9
-
SHA512
0e6c904c619db19de4235df71631a4408027023943897486214d448e791acd682d44736c7485f7562c578ccfbc9f2561452c1dca02fe5244d4d4f357974c1def
-
SSDEEP
12288:jERaXYP3vzh/k/u8OU8bo2KwVaO+kmydYptZauYi7bmadnZ/ktL5zGfcP28:6A03rh/k/GtJxVN0EuX7bmqCLUyp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 320 XFLF.exe -
Loads dropped DLL 4 IoCs
pid Process 1668 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe 1668 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe 320 XFLF.exe 320 XFLF.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run XFLF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XFLF Agent = "C:\\Windows\\SysWOW64\\28463\\XFLF.exe" XFLF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\XFLF.exe caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe File opened for modification C:\Windows\SysWOW64\28463 XFLF.exe File created C:\Windows\SysWOW64\28463\XFLF.009 XFLF.exe File opened for modification C:\Windows\SysWOW64\28463\XFLF.009 XFLF.exe File created C:\Windows\SysWOW64\28463\XFLF.001 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe File created C:\Windows\SysWOW64\28463\XFLF.006 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe File created C:\Windows\SysWOW64\28463\XFLF.007 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 320 XFLF.exe Token: SeIncBasePriorityPrivilege 320 XFLF.exe Token: SeIncBasePriorityPrivilege 320 XFLF.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 320 XFLF.exe 320 XFLF.exe 320 XFLF.exe 320 XFLF.exe 320 XFLF.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 320 1668 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe 28 PID 1668 wrote to memory of 320 1668 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe 28 PID 1668 wrote to memory of 320 1668 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe 28 PID 1668 wrote to memory of 320 1668 caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe 28 PID 320 wrote to memory of 1100 320 XFLF.exe 29 PID 320 wrote to memory of 1100 320 XFLF.exe 29 PID 320 wrote to memory of 1100 320 XFLF.exe 29 PID 320 wrote to memory of 1100 320 XFLF.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe"C:\Users\Admin\AppData\Local\Temp\caa29ec0210e6b847ef9bec405e139f106432db18eeec2ce95b96ef733e09fb9.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\28463\XFLF.exe"C:\Windows\system32\28463\XFLF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\XFLF.exe > nul3⤵PID:1100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382B
MD561b5d94fcab38f10530c40cd6903d412
SHA17f7c999492ed7bc3fe442a118f487c51145385bf
SHA256a836912164388a44a8737c7556c6ee4824bcfab0484ff2526710215cff3a265c
SHA51275e314dcd13d2da106533238ed245e3cf21f96190bc4c90c5db4c103af64d77a33568c31cee3882d0d76d982ed5648ce8a746a51bf128372648fb30397140941
-
Filesize
8KB
MD5911a5a213762001178a48b2ceefa1880
SHA1de9b25ac58e893397ab9ad3331bd922bbd5043ae
SHA256273375c7be87b6da793320ee25ea08967bf8cb43e6213e4af94955e565afabc9
SHA512cc4f95dc64085033a6f5308d61bce83991a8949ec89513fa0428527b6c20f40bc4ce0b323da3020f405f29bf3fcf703722082247f591568d39e8e355543f04c9
-
Filesize
5KB
MD52183e6a435b000fc6e85b712513c3480
SHA1c088b82494aaeca23a5acfaf83f55597bd0bdc6e
SHA2569a1a58cea0b0cfe3479d29bb39b0a5af0ee75fbd94254529ad28f2e54aec30e5
SHA51294ffbd46b10cf71ea59d3d44ceece691d7d50e8e111e330d44346f1e56e62d7a3b5c375917494fff89966d0ea5fc562d45b14b983269eba72b2831abce7a1afe
-
Filesize
602KB
MD58459b0ba642d016c60571a3ad31e6ec8
SHA119a7f23f7eee39ed4217ec44ef46b899eabc32c2
SHA256e859bf35940f45fab38d28c824ae1eabc16adbc98ff09bf579f09765c0e88655
SHA512812dca12499fd93627ef3a2a848f4a74be1009b2ebca29b5abe4218923338f5db753f573982dc7d8b4b4a3e0f8cf59748070394b2ae2f0f52c030ecc5c964e0d
-
Filesize
602KB
MD58459b0ba642d016c60571a3ad31e6ec8
SHA119a7f23f7eee39ed4217ec44ef46b899eabc32c2
SHA256e859bf35940f45fab38d28c824ae1eabc16adbc98ff09bf579f09765c0e88655
SHA512812dca12499fd93627ef3a2a848f4a74be1009b2ebca29b5abe4218923338f5db753f573982dc7d8b4b4a3e0f8cf59748070394b2ae2f0f52c030ecc5c964e0d
-
Filesize
4KB
MD5b89311bdf4e6640cc9051e629476cbe4
SHA1ced30235482232b045cd5d8004e8ead01b30f9ca
SHA256db0e9d83d8a5309ae4ab4747ff6ce506a2f85b01a598caad697a69b3ddb557a1
SHA5128e71c2238e23cd793feb061736d00f8aea0002f79e2632093529ed6242f9af2a99baa598d58c04bbc9c02715d7f18955ae88334e39caa2978e88904cf27911d4
-
Filesize
8KB
MD5911a5a213762001178a48b2ceefa1880
SHA1de9b25ac58e893397ab9ad3331bd922bbd5043ae
SHA256273375c7be87b6da793320ee25ea08967bf8cb43e6213e4af94955e565afabc9
SHA512cc4f95dc64085033a6f5308d61bce83991a8949ec89513fa0428527b6c20f40bc4ce0b323da3020f405f29bf3fcf703722082247f591568d39e8e355543f04c9
-
Filesize
5KB
MD52183e6a435b000fc6e85b712513c3480
SHA1c088b82494aaeca23a5acfaf83f55597bd0bdc6e
SHA2569a1a58cea0b0cfe3479d29bb39b0a5af0ee75fbd94254529ad28f2e54aec30e5
SHA51294ffbd46b10cf71ea59d3d44ceece691d7d50e8e111e330d44346f1e56e62d7a3b5c375917494fff89966d0ea5fc562d45b14b983269eba72b2831abce7a1afe
-
Filesize
602KB
MD58459b0ba642d016c60571a3ad31e6ec8
SHA119a7f23f7eee39ed4217ec44ef46b899eabc32c2
SHA256e859bf35940f45fab38d28c824ae1eabc16adbc98ff09bf579f09765c0e88655
SHA512812dca12499fd93627ef3a2a848f4a74be1009b2ebca29b5abe4218923338f5db753f573982dc7d8b4b4a3e0f8cf59748070394b2ae2f0f52c030ecc5c964e0d