Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe
Resource
win7-20220812-en
General
-
Target
e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe
-
Size
7.1MB
-
MD5
51dae8d6208cc255aea7ad0eaba77014
-
SHA1
dd949ae42f7bc491ac29d9d68b8d12379270bb1a
-
SHA256
e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b
-
SHA512
c3ab44e3e69e8baee8f215ab2297cab20d2fb9a56e375ae86e8e1102f7d43f683cee64bcd3bfcf59d60742bab80b371de3b18fd5519414787d1cf4eb2e992ed5
-
SSDEEP
196608:F7nmjqCE8cpmmTVPuF2O8ET7pbO0yA7GO:F7nYRE8cQmTVP2vnl7L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1520 Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe -
Deletes itself 1 IoCs
pid Process 760 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1160 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1908 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 1520 Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe 1520 Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe 1520 Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe 1520 Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe 1520 Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe 1520 Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1160 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 28 PID 1248 wrote to memory of 1160 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 28 PID 1248 wrote to memory of 1160 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 28 PID 1248 wrote to memory of 1160 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 28 PID 1248 wrote to memory of 1520 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 30 PID 1248 wrote to memory of 1520 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 30 PID 1248 wrote to memory of 1520 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 30 PID 1248 wrote to memory of 1520 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 30 PID 1248 wrote to memory of 760 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 31 PID 1248 wrote to memory of 760 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 31 PID 1248 wrote to memory of 760 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 31 PID 1248 wrote to memory of 760 1248 e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe 31 PID 760 wrote to memory of 1080 760 cmd.exe 33 PID 760 wrote to memory of 1080 760 cmd.exe 33 PID 760 wrote to memory of 1080 760 cmd.exe 33 PID 760 wrote to memory of 1080 760 cmd.exe 33 PID 760 wrote to memory of 1908 760 cmd.exe 34 PID 760 wrote to memory of 1908 760 cmd.exe 34 PID 760 wrote to memory of 1908 760 cmd.exe 34 PID 760 wrote to memory of 1908 760 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe"C:\Users\Admin\AppData\Local\Temp\e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe"2⤵
- Creates scheduled task(s)
PID:1160
-
-
C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe"C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1080
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe
Filesize795.1MB
MD5481ca7865c2390386cc3d1aab80cec2a
SHA1f3e807bb1b31ea6fd79797a5125a18e13dc40a90
SHA256abc48f8a1ca507688aaffe601e0744607f516f28b7f2814f25c9f49b31bfc729
SHA512a810031388d06da147b0abe59f9d3cdf81574d7a20bd43a61242d3395e5c61109185bb7833264a8034d07b8dc974e85e5bd212b9ed44986e2587cb2164536196
-
C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe
Filesize795.1MB
MD5481ca7865c2390386cc3d1aab80cec2a
SHA1f3e807bb1b31ea6fd79797a5125a18e13dc40a90
SHA256abc48f8a1ca507688aaffe601e0744607f516f28b7f2814f25c9f49b31bfc729
SHA512a810031388d06da147b0abe59f9d3cdf81574d7a20bd43a61242d3395e5c61109185bb7833264a8034d07b8dc974e85e5bd212b9ed44986e2587cb2164536196
-
\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe
Filesize795.1MB
MD5481ca7865c2390386cc3d1aab80cec2a
SHA1f3e807bb1b31ea6fd79797a5125a18e13dc40a90
SHA256abc48f8a1ca507688aaffe601e0744607f516f28b7f2814f25c9f49b31bfc729
SHA512a810031388d06da147b0abe59f9d3cdf81574d7a20bd43a61242d3395e5c61109185bb7833264a8034d07b8dc974e85e5bd212b9ed44986e2587cb2164536196