Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 13:49

General

  • Target

    d844192668166a6fdfb3aeb0fe0ad26d12acb799af0113799892693ae6a04a2b.exe

  • Size

    158KB

  • MD5

    2111d2bcb980045c8996849bec03d482

  • SHA1

    390399696cf3edf8ef38b62697a4eea2d7fcb974

  • SHA256

    d844192668166a6fdfb3aeb0fe0ad26d12acb799af0113799892693ae6a04a2b

  • SHA512

    73f84b31aa80b6c486e8a332df0a8b2b9c22630f71cb8f8c3a8da8746348d61882f147433a764d1715b80b1941db9e9b2671ae51d347d53f8ccaaad203d84a80

  • SSDEEP

    3072:YBAp5XhKpN4eOyVTGfhEClj8jTk+0hMKBz6Q+hGNHNExjjsq:PbXE9OiTGfhEClq9FKxF+EHNkP

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d844192668166a6fdfb3aeb0fe0ad26d12acb799af0113799892693ae6a04a2b.exe
    "C:\Users\Admin\AppData\Local\Temp\d844192668166a6fdfb3aeb0fe0ad26d12acb799af0113799892693ae6a04a2b.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\Ls\Ik\borzayapizdotaizmemomoyaaa.bat" "
      2⤵
      • Drops file in Drivers directory
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Ls\Ik\solnechagnitogorsk.vbs"
        3⤵
        • Drops file in Drivers directory
        PID:1768
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Ls\Ik\zachet_nezachet_zachet.vbs"
        3⤵
          PID:1664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Ls\Ik\borzayapizdotaizmemomoyaaa.bat

      Filesize

      2KB

      MD5

      b6803f1a7ed36f9cbaf042ac321cebdd

      SHA1

      ab17bf26dec1b4eddf00b923b58b57abe2d12adb

      SHA256

      8dc8ca059fa97c33f5f993879c5037034c2dd6a26aad1df9eaebeac0165743e3

      SHA512

      4fd2f5d0c233eca9262881fe42fd2ff50ac2a5d66085efbb1e92f619c7c548987bf9973873ebca97e1fc6a923d55c8ee3367541c08c7e4cdd0f11acdbe6573f5

    • C:\Program Files (x86)\Ls\Ik\solnechagnitogorsk.vbs

      Filesize

      990B

      MD5

      ed241a3ca1852f4dcadd0728185fa727

      SHA1

      0e59cb304b8bce175fd5bc0d8ab60a5a2a01ee5e

      SHA256

      aa15cf0188983a7ed6ec2e3097bb847cd1bdfe74a37c9eee6abaf957ab8310d8

      SHA512

      16146739ea3cf1c9c2785398fb73bbf9e947176e9260bc1e78c96f580bd3f629e1ef5f93c4a0e95a75d268b0906fe6c4a2eafcaaeea55992ff00b7d5bf5c5d9d

    • C:\Program Files (x86)\Ls\Ik\tanrismika.eb

      Filesize

      39B

      MD5

      bd878828448f38ce620f9535dc8aea4b

      SHA1

      8b4a5a7c795b1404e76e69b51ce85545e5bd8e86

      SHA256

      c1095efddaa97d50f0fb0beffa3fefa27435cd4444683d25e5398a82601bf285

      SHA512

      76864327e0cf172869ba3532b51cfb4279eafe78eb5d7cf5a68fea47f395c27156c9add1e29917143b9a37f153b7dd6421edbefb2d7be8a1d21cf3e6ac5651fe

    • C:\Program Files (x86)\Ls\Ik\zachet_nezachet_zachet.vbs

      Filesize

      179B

      MD5

      0604ed22423f5146bcb46c82229a95df

      SHA1

      e4a0cb9dcd98c9d6f7c87d9c56eb506a7f75bc5f

      SHA256

      2c62c68be848d62dfe0eceeb9a969b7db05616f9ba0833b45cbf690451df4a4f

      SHA512

      d73fda22f5af02ebf82517f0e1abca3dd06cc52bda5e51088b649612e903ca90eb1d1313664cbdf55d8d59ee10cd06c4b416c405ef162084b1105386477871cd

    • C:\Program Files (x86)\Ls\Ik\ziznbogom.vt

      Filesize

      27B

      MD5

      213c0742081a9007c9093a01760f9f8c

      SHA1

      df53bb518c732df777b5ce19fc7c02dcb2f9d81b

      SHA256

      9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

      SHA512

      55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      87f793106119d87a3d0fd6b0bacc4374

      SHA1

      9b72ad9ff4ce8e7084c49d253e222a5a168132d2

      SHA256

      8087d3b42a5216fa91a1b88f56f9098c8927548294b6d0aea3d69c443b92d721

      SHA512

      150afe95e5519d2c300b839bc9b352b72f4341146fed1981422c5dd2821633f74d786f9e4dc9b47afd01fd7dbeb474c2c8c15bd318042acd9c80ac674b012fd9

    • memory/1116-54-0x0000000076031000-0x0000000076033000-memory.dmp

      Filesize

      8KB