Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    220s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 09:58

General

  • Target

    91fe2293aa09da2e22fd59f9ee538ba80dbc249329b57583f66d86f280ff2363.exe

  • Size

    595KB

  • MD5

    ed0e13d01d2d233abf46942a6d454cbe

  • SHA1

    cb920a79944b7ffb7d885f392cb9a1fe825d0502

  • SHA256

    91fe2293aa09da2e22fd59f9ee538ba80dbc249329b57583f66d86f280ff2363

  • SHA512

    69df9c3c263bfb671ea74945cc78396e723aa1c69f2b39d6367661304d41311bf92b89d309d41ba7523df5f6d12d56b15c3e50cbff1d93887c9d93690a3b24ce

  • SSDEEP

    12288:Qv6+G3JczlR9PBQpN+qCYC1d+y7GOzSk40wYwiPvH:hF5ElRWPi4yyOeRov

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91fe2293aa09da2e22fd59f9ee538ba80dbc249329b57583f66d86f280ff2363.exe
    "C:\Users\Admin\AppData\Local\Temp\91fe2293aa09da2e22fd59f9ee538ba80dbc249329b57583f66d86f280ff2363.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Program Files\3721.exe
      "C:\Program Files\3721.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\SysWOW64\net1.exe
        "C:\Windows\System32\net1.exe" start sharedaccess
        3⤵
          PID:392
        • C:\Windows\SysWOW64\dllcache\ntvdame.exe
          "C:\Windows\system32\dllcache\ntvdame.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\SysWOW64\net1.exe
            "C:\Windows\System32\net1.exe" start sharedaccess
            4⤵
              PID:308

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\3721.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • C:\Program Files\3721.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • C:\Windows\SysWOW64\dllcache\ntvdame.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • C:\Windows\SysWOW64\dllcache\ntvdame.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • \Program Files\3721.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • \Program Files\3721.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • \Windows\SysWOW64\dllcache\ntvdame.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • \Windows\SysWOW64\dllcache\ntvdame.exe

        Filesize

        37KB

        MD5

        82c28e7105ef6317f1e3302c05ec638f

        SHA1

        caa6de74b2245a122b0d007d2d8fa0a712551a5d

        SHA256

        b9f6fa466a607d3c58e74fa532239cd6122c5ea8e40a35eb6e78e4a79ef111d8

        SHA512

        d44e19cf9085935e96650c38684edea129691abbc212bbd2d63b0c09ee35fd13003b5e89c67f976965fa72225a13588198f1635740ded728b5fe85c54c1f7b26

      • memory/1116-73-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/1116-74-0x0000000074441000-0x0000000074443000-memory.dmp

        Filesize

        8KB

      • memory/1116-77-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/1752-54-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

        Filesize

        8KB

      • memory/1752-62-0x00000000005E0000-0x00000000005FD000-memory.dmp

        Filesize

        116KB

      • memory/1752-61-0x00000000005E0000-0x00000000005FD000-memory.dmp

        Filesize

        116KB

      • memory/1752-55-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB

      • memory/1752-75-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB

      • memory/1752-76-0x00000000005E0000-0x00000000005FD000-memory.dmp

        Filesize

        116KB

      • memory/1780-63-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB