Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 15:21

General

  • Target

    c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe

  • Size

    120KB

  • MD5

    d4d4284a95570af5f7c2253238ff447f

  • SHA1

    df0287f2c672950818cbe1776a0891b0db6907be

  • SHA256

    c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67

  • SHA512

    3f35e8f549f48cb7d6b7d2098991e3b535fa4ae4ee871c8fd14fc71e56a204ee00961b7535650f452c754b2a7799c2f486525e896945559e3e233a6fb89530b7

  • SSDEEP

    3072:qRKTmmOdPwxisvT44eWue2N6+rI0//TlgKlpT7mnQQgCKn4:86I3044m8II0/LeyyVLV

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe
    "C:\Users\Admin\AppData\Local\Temp\c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.hao73.cn/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3DSPIDK0.txt

    Filesize

    601B

    MD5

    bc16254e564492ac7e08ce1101b5b301

    SHA1

    2900775145ed78bc98cd09358a962d8da9b8300d

    SHA256

    680f4c45915bcbf273be8c53b91d8fd5c5d310284d505a46291c77b5ffce6091

    SHA512

    150dc5f8f9e6a110bcc12c2658546633767a478f179afc97715568c83e660d1b856e44e3bdf1394e14aad038b7eb039e8ec0d038cacad1e00d32556781ecb7e5

  • memory/960-54-0x00000000753D1000-0x00000000753D3000-memory.dmp

    Filesize

    8KB

  • memory/960-55-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/960-59-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB