Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 02:48

General

  • Target

    20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe

  • Size

    320KB

  • MD5

    45143b5cbfac2ae07a8141c131d174cb

  • SHA1

    cc9737f24163d9113b6941513d14fc49a2bad178

  • SHA256

    20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5

  • SHA512

    a1b828abc6b60757052fd847e27bd753acc38b9e0f51990612675c3a1f93d4ec2bd7bc7e2fe4bae9cc8699d56ee05b65e03530a5d343383cab87bdc4d721bff1

  • SSDEEP

    6144:0tpYwn/ze9c0MCQ8rOHnB2gXr2i+y6VPuGrtzcSX6tzLDTH5YfJpf2ru9c9TKHUW:EZLdCQ8rKTH5YfJpf2ru9c9TK0sVCWpT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe
    "C:\Users\Admin\AppData\Local\Temp\20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\laimuj.exe
      "C:\Users\Admin\laimuj.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\laimuj.exe

    Filesize

    320KB

    MD5

    3effc45b00b3fa220c8aa02f35c1dfbf

    SHA1

    458989fedeb609904bf1ad12f0cc16358c4d670c

    SHA256

    34e507f14b0627d049567f2c63aa633e8f3501a954cf82422916df912e126b6a

    SHA512

    18624a45fa7b45a3775c4bd2bb750f85c1ff9863c1708ab6bac20dc67d13bca0ed77a043908be8996e1c736cd3b5324525a77cd8cc29e124011bc4cdb90bdb52

  • C:\Users\Admin\laimuj.exe

    Filesize

    320KB

    MD5

    3effc45b00b3fa220c8aa02f35c1dfbf

    SHA1

    458989fedeb609904bf1ad12f0cc16358c4d670c

    SHA256

    34e507f14b0627d049567f2c63aa633e8f3501a954cf82422916df912e126b6a

    SHA512

    18624a45fa7b45a3775c4bd2bb750f85c1ff9863c1708ab6bac20dc67d13bca0ed77a043908be8996e1c736cd3b5324525a77cd8cc29e124011bc4cdb90bdb52

  • \Users\Admin\laimuj.exe

    Filesize

    320KB

    MD5

    3effc45b00b3fa220c8aa02f35c1dfbf

    SHA1

    458989fedeb609904bf1ad12f0cc16358c4d670c

    SHA256

    34e507f14b0627d049567f2c63aa633e8f3501a954cf82422916df912e126b6a

    SHA512

    18624a45fa7b45a3775c4bd2bb750f85c1ff9863c1708ab6bac20dc67d13bca0ed77a043908be8996e1c736cd3b5324525a77cd8cc29e124011bc4cdb90bdb52

  • \Users\Admin\laimuj.exe

    Filesize

    320KB

    MD5

    3effc45b00b3fa220c8aa02f35c1dfbf

    SHA1

    458989fedeb609904bf1ad12f0cc16358c4d670c

    SHA256

    34e507f14b0627d049567f2c63aa633e8f3501a954cf82422916df912e126b6a

    SHA512

    18624a45fa7b45a3775c4bd2bb750f85c1ff9863c1708ab6bac20dc67d13bca0ed77a043908be8996e1c736cd3b5324525a77cd8cc29e124011bc4cdb90bdb52

  • memory/1032-56-0x0000000076711000-0x0000000076713000-memory.dmp

    Filesize

    8KB