Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
17/12/2022, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1.5MB
-
MD5
07fd348ebdbd39eb60eea9cea78bbc3d
-
SHA1
03710363ec81ea9a2acff167ce0e2bb6287c82b8
-
SHA256
e1ed702f5eeae3c7808e0d617f9c03d108c6d4fe95f737331cb3e27a33697b3d
-
SHA512
95363afc4a659ac5a118ef6b6ebecab93f771156f735fb87f8c1d2546720e7074837eda61b3bb854145915ea778689f0631d0d00c25067733ad22936400bfc3e
-
SSDEEP
24576:v2ectSRRfRnp/FZqRT0aCCwkJshwiVz+SscejPNxSc9LgoKvsdMEUaE2pxk9bZH2:v2XW7p9wCCw1SyFsV585vcMq9pxk9dH2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 832 is-UTT8N.tmp -
Loads dropped DLL 3 IoCs
pid Process 1816 tmp.exe 832 is-UTT8N.tmp 832 is-UTT8N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1816 wrote to memory of 832 1816 tmp.exe 27 PID 1816 wrote to memory of 832 1816 tmp.exe 27 PID 1816 wrote to memory of 832 1816 tmp.exe 27 PID 1816 wrote to memory of 832 1816 tmp.exe 27 PID 1816 wrote to memory of 832 1816 tmp.exe 27 PID 1816 wrote to memory of 832 1816 tmp.exe 27 PID 1816 wrote to memory of 832 1816 tmp.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\is-8LA8G.tmp\is-UTT8N.tmp"C:\Users\Admin\AppData\Local\Temp\is-8LA8G.tmp\is-UTT8N.tmp" /SL4 $80124 "C:\Users\Admin\AppData\Local\Temp\tmp.exe" 1307495 517122⤵
- Executes dropped EXE
- Loads dropped DLL
PID:832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651KB
MD5d2cb3558dffecad8c2cec1e4eef9e581
SHA1a83eb9617dc62612e38dff1ac0d13e6c485f03c2
SHA256206e3c68af6a2bb488fd9f8141a81c0f817f1cd3704cf8a4d4de2b0e2dba8605
SHA51264af57b903812b2ddc5a6dd3cc8f81c0f37dc9e45776a33af4ac1bedf66d22271b83cd3e11cb3c1024e26a305ff676e27f4d09120a580a3f95b21dc7e46fb502
-
Filesize
651KB
MD5d2cb3558dffecad8c2cec1e4eef9e581
SHA1a83eb9617dc62612e38dff1ac0d13e6c485f03c2
SHA256206e3c68af6a2bb488fd9f8141a81c0f817f1cd3704cf8a4d4de2b0e2dba8605
SHA51264af57b903812b2ddc5a6dd3cc8f81c0f37dc9e45776a33af4ac1bedf66d22271b83cd3e11cb3c1024e26a305ff676e27f4d09120a580a3f95b21dc7e46fb502
-
Filesize
651KB
MD5d2cb3558dffecad8c2cec1e4eef9e581
SHA1a83eb9617dc62612e38dff1ac0d13e6c485f03c2
SHA256206e3c68af6a2bb488fd9f8141a81c0f817f1cd3704cf8a4d4de2b0e2dba8605
SHA51264af57b903812b2ddc5a6dd3cc8f81c0f37dc9e45776a33af4ac1bedf66d22271b83cd3e11cb3c1024e26a305ff676e27f4d09120a580a3f95b21dc7e46fb502
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3