Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 02:41

General

  • Target

    803853669515bfa17050e02ef9074acf3d5d68b1b9043196dfe4f483306cc2be.exe

  • Size

    200KB

  • MD5

    138cb66ce783d31d377b47f8b8e48441

  • SHA1

    95176afca9fa70f41ffae1ca3f1c7b147d659cf3

  • SHA256

    803853669515bfa17050e02ef9074acf3d5d68b1b9043196dfe4f483306cc2be

  • SHA512

    a0fafa2b3e11665956a4292783b8c693ca576e579bb754f344e60e03594f613e14301bae15e4f961c89d0389a6e320cebd9750cb695b360eedaffe99d16ce988

  • SSDEEP

    3072:UTtcstTstk/pSBAFtbCduLCADMcgg7keGdJu:8tcATstk/pp2ADMVCwJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 45 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\803853669515bfa17050e02ef9074acf3d5d68b1b9043196dfe4f483306cc2be.exe
    "C:\Users\Admin\AppData\Local\Temp\803853669515bfa17050e02ef9074acf3d5d68b1b9043196dfe4f483306cc2be.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\qiuos.exe
      "C:\Users\Admin\qiuos.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qiuos.exe

    Filesize

    200KB

    MD5

    4de3fca957ef8d5e6747448bca3c9571

    SHA1

    96553502ac480b1481af79c5527b8286e2a1f1ec

    SHA256

    06f118fcbed5b9c4e135a84bb7a207579e5deb426f3ac370023b6bedeb6a1001

    SHA512

    209b0734b9e04066fba2ec231d97189f3157e1037b19d0151415ee7d3fd7d2ccc32659e468cca09dc29279aee239f83a1a73d0cc9bec4487e1ee02de57c76896

  • C:\Users\Admin\qiuos.exe

    Filesize

    200KB

    MD5

    4de3fca957ef8d5e6747448bca3c9571

    SHA1

    96553502ac480b1481af79c5527b8286e2a1f1ec

    SHA256

    06f118fcbed5b9c4e135a84bb7a207579e5deb426f3ac370023b6bedeb6a1001

    SHA512

    209b0734b9e04066fba2ec231d97189f3157e1037b19d0151415ee7d3fd7d2ccc32659e468cca09dc29279aee239f83a1a73d0cc9bec4487e1ee02de57c76896

  • \Users\Admin\qiuos.exe

    Filesize

    200KB

    MD5

    4de3fca957ef8d5e6747448bca3c9571

    SHA1

    96553502ac480b1481af79c5527b8286e2a1f1ec

    SHA256

    06f118fcbed5b9c4e135a84bb7a207579e5deb426f3ac370023b6bedeb6a1001

    SHA512

    209b0734b9e04066fba2ec231d97189f3157e1037b19d0151415ee7d3fd7d2ccc32659e468cca09dc29279aee239f83a1a73d0cc9bec4487e1ee02de57c76896

  • \Users\Admin\qiuos.exe

    Filesize

    200KB

    MD5

    4de3fca957ef8d5e6747448bca3c9571

    SHA1

    96553502ac480b1481af79c5527b8286e2a1f1ec

    SHA256

    06f118fcbed5b9c4e135a84bb7a207579e5deb426f3ac370023b6bedeb6a1001

    SHA512

    209b0734b9e04066fba2ec231d97189f3157e1037b19d0151415ee7d3fd7d2ccc32659e468cca09dc29279aee239f83a1a73d0cc9bec4487e1ee02de57c76896

  • memory/2032-56-0x0000000075991000-0x0000000075993000-memory.dmp

    Filesize

    8KB