Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe
Resource
win10v2004-20220901-en
General
-
Target
697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe
-
Size
900KB
-
MD5
198f415b24b28b8990a1f8f23d352150
-
SHA1
4495cda6c0d58c6b63fc0d7a8140136a62b04acb
-
SHA256
697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d
-
SHA512
f2408acb5bb6e8d521fdc0112f58d5ba9051cec8cde46c45771f95e476299c797537ae3d1185df2ddd0d6620d76740fc9ee0ee2f35386576936c2cb6031f4c0d
-
SSDEEP
24576:/Wb6aXAxG3hB4LzNnAyXo/HrbszVjZGwcUhULRAB8s:9wxB4JARvrwVjwUhEmB8s
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1164 1.exe 820 1.exe 1084 CLOCXS~1.EXE 1352 ClocX.exe -
resource yara_rule behavioral1/files/0x000c0000000122ff-55.dat upx behavioral1/files/0x000c0000000122ff-56.dat upx behavioral1/files/0x000c0000000122ff-58.dat upx behavioral1/files/0x000c0000000122ff-61.dat upx behavioral1/files/0x000c0000000122ff-60.dat upx behavioral1/files/0x000c0000000122ff-64.dat upx behavioral1/files/0x000c0000000122ff-71.dat upx behavioral1/memory/1164-73-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x000c0000000122ff-75.dat upx behavioral1/files/0x0007000000012741-83.dat upx behavioral1/files/0x0007000000012741-82.dat upx behavioral1/files/0x0007000000012741-86.dat upx behavioral1/files/0x0007000000012741-91.dat upx behavioral1/files/0x0007000000012741-90.dat upx behavioral1/memory/1352-96-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/1352-102-0x0000000000400000-0x000000000044A000-memory.dmp upx -
Loads dropped DLL 10 IoCs
pid Process 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 1164 1.exe 1164 1.exe 820 1.exe 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 1084 CLOCXS~1.EXE 1084 CLOCXS~1.EXE 1084 CLOCXS~1.EXE 1352 ClocX.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1164 set thread context of 820 1164 1.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 820 1.exe 820 1.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1352 ClocX.exe 1352 ClocX.exe 1352 ClocX.exe 1352 ClocX.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1352 ClocX.exe 1352 ClocX.exe 1352 ClocX.exe 1352 ClocX.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1164 1.exe 1352 ClocX.exe 1352 ClocX.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 240 wrote to memory of 1164 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 28 PID 240 wrote to memory of 1164 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 28 PID 240 wrote to memory of 1164 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 28 PID 240 wrote to memory of 1164 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 28 PID 240 wrote to memory of 1164 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 28 PID 240 wrote to memory of 1164 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 28 PID 240 wrote to memory of 1164 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 28 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 1164 wrote to memory of 820 1164 1.exe 29 PID 240 wrote to memory of 1084 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 30 PID 240 wrote to memory of 1084 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 30 PID 240 wrote to memory of 1084 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 30 PID 240 wrote to memory of 1084 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 30 PID 240 wrote to memory of 1084 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 30 PID 240 wrote to memory of 1084 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 30 PID 240 wrote to memory of 1084 240 697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe 30 PID 1084 wrote to memory of 1352 1084 CLOCXS~1.EXE 31 PID 1084 wrote to memory of 1352 1084 CLOCXS~1.EXE 31 PID 1084 wrote to memory of 1352 1084 CLOCXS~1.EXE 31 PID 1084 wrote to memory of 1352 1084 CLOCXS~1.EXE 31 PID 1084 wrote to memory of 1352 1084 CLOCXS~1.EXE 31 PID 1084 wrote to memory of 1352 1084 CLOCXS~1.EXE 31 PID 1084 wrote to memory of 1352 1084 CLOCXS~1.EXE 31 PID 820 wrote to memory of 1432 820 1.exe 9 PID 820 wrote to memory of 1432 820 1.exe 9 PID 820 wrote to memory of 1432 820 1.exe 9 PID 820 wrote to memory of 1432 820 1.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe"C:\Users\Admin\AppData\Local\Temp\697e62397fc23378fba522e74ea346037d824a3eaf9f6bd327463ec9f407801d.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CLOCXS~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CLOCXS~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ClocX.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ClocX.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
833KB
MD50dcc426207c512d94489e8ef441d8fdb
SHA15a9e252b90fbc641d5cda07e03855179f5a8ee02
SHA25660b0ac49eab24a7b2903ff3583d9d8f7e1af9eab8535779ced4a771cce7b17d7
SHA5125b1854f77025ebb12f531201b300ce59a6ca56f893e2d104e8cde02577b38a7b92638d1590343e288847c648aaed09f20da5d46479721b1156b283e0ee7098c9
-
Filesize
833KB
MD50dcc426207c512d94489e8ef441d8fdb
SHA15a9e252b90fbc641d5cda07e03855179f5a8ee02
SHA25660b0ac49eab24a7b2903ff3583d9d8f7e1af9eab8535779ced4a771cce7b17d7
SHA5125b1854f77025ebb12f531201b300ce59a6ca56f893e2d104e8cde02577b38a7b92638d1590343e288847c648aaed09f20da5d46479721b1156b283e0ee7098c9
-
Filesize
101KB
MD5fb2060dd6983a555be9e06d961a61f04
SHA1046e1d266541f3f36c241a5ebdc51bf5bf74da26
SHA256458d8ff6c5c6e50b1b399c0cf470d2f5c41155135ad88d1461861d447655e24e
SHA51276174713e0c6246529faa5c968889f36139e7f6ca60d5f72183ccf830cc23f3384839a15130c68a9c557d20f208fcfa792d902203c57f24a2c864aafd2174526
-
Filesize
101KB
MD5fb2060dd6983a555be9e06d961a61f04
SHA1046e1d266541f3f36c241a5ebdc51bf5bf74da26
SHA256458d8ff6c5c6e50b1b399c0cf470d2f5c41155135ad88d1461861d447655e24e
SHA51276174713e0c6246529faa5c968889f36139e7f6ca60d5f72183ccf830cc23f3384839a15130c68a9c557d20f208fcfa792d902203c57f24a2c864aafd2174526
-
Filesize
1KB
MD5b9d183177a3683b3903fe1ba2479b3e0
SHA19f0a96887fe649be1f85354037cbeed15cd3fde1
SHA25638bde16b0becfe8518e55dca0026a152ff70729094d62cc8c8b2e2c38ffb64bb
SHA5129a39b4a31fef085ce833080d46a5baca71cbc75c7d0334c8359e5ab7db5c5a799257f7d82bdf60b396d6390e2e982fb61692b0d68b550fc05ede6ef62ab84e8d
-
Filesize
1KB
MD586862ce9f45c02ea47039d62c48e8da7
SHA1071e3f49d8a6a875e60becef89d375c1d2b48cef
SHA256a74c8cea1676ce0d492f5b1fbfc0094d8e7057b882e128fc7245a5ba5acbc911
SHA512abb9b5e874d607b09a592903075fbbe611fbae5bf1e8956cdbc00faf9c92a1e78cd45c6406f1e92dbd0863d1a2eeb6e84e30c111d22e560896df1c11ae6d8326
-
Filesize
43KB
MD50358e472737300b9b2eee897f77fe087
SHA1f637295945d056d1fdfce5f0f5a0571534b24c45
SHA2569353998033ec9b6bec6f17680af57940283c84ea0aa99a22dbdcc34c42ec5383
SHA5129f88c50d3efc1ec390e115049f44c38499c32b94df3c1b9de4b7da54a070244d36bca26365e0eb61ce8019c7e6c33ecfe789dc736b2f4707e87bc337174a665a
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
59KB
MD520003d25cef119d2c03e70fb332adbc3
SHA17170c157aac6d51b7ac9d6d161106b504ea275bd
SHA256a687665a2f6fc8f137fbd4564a56a603c7e98c5322c2063e3a39ef61509cea53
SHA5129b92a48609b71dd7b30407817e12a5cae2a28daad5213cf38a4407a6b8bc24688a6a6194c4ff28afa84c57f788a0c4352697cc775505dd1e549cdbfba16235b4
-
Filesize
833KB
MD50dcc426207c512d94489e8ef441d8fdb
SHA15a9e252b90fbc641d5cda07e03855179f5a8ee02
SHA25660b0ac49eab24a7b2903ff3583d9d8f7e1af9eab8535779ced4a771cce7b17d7
SHA5125b1854f77025ebb12f531201b300ce59a6ca56f893e2d104e8cde02577b38a7b92638d1590343e288847c648aaed09f20da5d46479721b1156b283e0ee7098c9
-
Filesize
833KB
MD50dcc426207c512d94489e8ef441d8fdb
SHA15a9e252b90fbc641d5cda07e03855179f5a8ee02
SHA25660b0ac49eab24a7b2903ff3583d9d8f7e1af9eab8535779ced4a771cce7b17d7
SHA5125b1854f77025ebb12f531201b300ce59a6ca56f893e2d104e8cde02577b38a7b92638d1590343e288847c648aaed09f20da5d46479721b1156b283e0ee7098c9
-
Filesize
101KB
MD5fb2060dd6983a555be9e06d961a61f04
SHA1046e1d266541f3f36c241a5ebdc51bf5bf74da26
SHA256458d8ff6c5c6e50b1b399c0cf470d2f5c41155135ad88d1461861d447655e24e
SHA51276174713e0c6246529faa5c968889f36139e7f6ca60d5f72183ccf830cc23f3384839a15130c68a9c557d20f208fcfa792d902203c57f24a2c864aafd2174526
-
Filesize
101KB
MD5fb2060dd6983a555be9e06d961a61f04
SHA1046e1d266541f3f36c241a5ebdc51bf5bf74da26
SHA256458d8ff6c5c6e50b1b399c0cf470d2f5c41155135ad88d1461861d447655e24e
SHA51276174713e0c6246529faa5c968889f36139e7f6ca60d5f72183ccf830cc23f3384839a15130c68a9c557d20f208fcfa792d902203c57f24a2c864aafd2174526
-
Filesize
101KB
MD5fb2060dd6983a555be9e06d961a61f04
SHA1046e1d266541f3f36c241a5ebdc51bf5bf74da26
SHA256458d8ff6c5c6e50b1b399c0cf470d2f5c41155135ad88d1461861d447655e24e
SHA51276174713e0c6246529faa5c968889f36139e7f6ca60d5f72183ccf830cc23f3384839a15130c68a9c557d20f208fcfa792d902203c57f24a2c864aafd2174526