Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
285s -
max time network
288s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/12/2022, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe
Resource
win10-20220812-en
General
-
Target
5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe
-
Size
1.0MB
-
MD5
bb233d4542a170be01c2d14cbb4a1d8a
-
SHA1
3f5b38c62ab67eb8612af6280294b524d94891cd
-
SHA256
5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352
-
SHA512
fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3
-
SSDEEP
24576:8RVbNR6HnOroQkHwiO7bw0mFR+0rRLgLJ1sbw1vhY:kT8HjQkQ1nmFRryLJ1sGv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 1592 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe -
Loads dropped DLL 1 IoCs
pid Process 1032 taskeng.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1460 set thread context of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 1916 set thread context of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1780 powershell.exe 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 1164 powershell.exe 1068 powershell.exe 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 1592 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 1592 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 1592 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 1592 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 1592 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe Token: SeDebugPrivilege 596 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe Token: SeDebugPrivilege 1592 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1780 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 28 PID 1460 wrote to memory of 1780 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 28 PID 1460 wrote to memory of 1780 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 28 PID 1460 wrote to memory of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 1460 wrote to memory of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 1460 wrote to memory of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 1460 wrote to memory of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 1460 wrote to memory of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 1460 wrote to memory of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 1460 wrote to memory of 596 1460 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 30 PID 596 wrote to memory of 1164 596 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 31 PID 596 wrote to memory of 1164 596 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 31 PID 596 wrote to memory of 1164 596 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 31 PID 1032 wrote to memory of 1916 1032 taskeng.exe 34 PID 1032 wrote to memory of 1916 1032 taskeng.exe 34 PID 1032 wrote to memory of 1916 1032 taskeng.exe 34 PID 1916 wrote to memory of 1068 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 35 PID 1916 wrote to memory of 1068 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 35 PID 1916 wrote to memory of 1068 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 35 PID 1916 wrote to memory of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37 PID 1916 wrote to memory of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37 PID 1916 wrote to memory of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37 PID 1916 wrote to memory of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37 PID 1916 wrote to memory of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37 PID 1916 wrote to memory of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37 PID 1916 wrote to memory of 1592 1916 5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe"C:\Users\Admin\AppData\Local\Temp\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exeC:\Users\Admin\AppData\Local\Temp\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3D101C27-5D9A-4817-BDC2-C8EF16804F04} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Roaming\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exeC:\Users\Admin\AppData\Roaming\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Users\Admin\AppData\Roaming\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exeC:\Users\Admin\AppData\Roaming\5e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5bb233d4542a170be01c2d14cbb4a1d8a
SHA13f5b38c62ab67eb8612af6280294b524d94891cd
SHA2565e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352
SHA512fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3
-
Filesize
1.0MB
MD5bb233d4542a170be01c2d14cbb4a1d8a
SHA13f5b38c62ab67eb8612af6280294b524d94891cd
SHA2565e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352
SHA512fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3
-
Filesize
1.0MB
MD5bb233d4542a170be01c2d14cbb4a1d8a
SHA13f5b38c62ab67eb8612af6280294b524d94891cd
SHA2565e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352
SHA512fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5718bcc01891322d13fc85d6c6beb8f02
SHA1b287110c0b88d85e4536aa39c527a4dc8b09d73d
SHA256236a40397de8247473c9a1b48d373990d61f51ceeed96b631fa310542f23469c
SHA5126fd7dcfe20464a3d97d2f69bb1e6d8c7dcd643989d6313753b44d7680367170f3a479e1e46a1b4a06cc305ff79d57cf309a0671eb0009c5cc45cabadf6699f27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5718bcc01891322d13fc85d6c6beb8f02
SHA1b287110c0b88d85e4536aa39c527a4dc8b09d73d
SHA256236a40397de8247473c9a1b48d373990d61f51ceeed96b631fa310542f23469c
SHA5126fd7dcfe20464a3d97d2f69bb1e6d8c7dcd643989d6313753b44d7680367170f3a479e1e46a1b4a06cc305ff79d57cf309a0671eb0009c5cc45cabadf6699f27
-
Filesize
1.0MB
MD5bb233d4542a170be01c2d14cbb4a1d8a
SHA13f5b38c62ab67eb8612af6280294b524d94891cd
SHA2565e6259b44a9bd71bfa23de11910ac94d336a6d4d988082afaf94d60065069352
SHA512fac8a98136e7c244d34e2bb8afeb5365597994030ba266f0640808addd990f90395be95a3e518c7406c3872cdf333a054da9537ebd266511918011ce7a747bb3