Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21/12/2022, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
stripped.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
stripped.exe
Resource
win10v2004-20221111-en
General
-
Target
stripped.exe
-
Size
239KB
-
MD5
4efaf3c856cbc3a0a9078e8105c4c2a1
-
SHA1
5258925002bbc57405578a59375dff67edfdfb6f
-
SHA256
ec22fe1001066151dcaba55d013dd5a69886ec09d947118a9682f4a673890512
-
SHA512
4949819f589a6042604879aae0424c9d172cf6e18b1e6ca01a53de6d136249a59fa3fe77e3cac56942499d7c319b7156b83db5c31711d36a58a219808e3a3f2f
-
SSDEEP
3072:HAcREh6pPlF7LCh8dM7QlBP5o3x8YcwIFU9OImpVYe3d3ROR:PKMpPlfy70zBYcwIe9DkL3pRO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1708 svcupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 988 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1364 wrote to memory of 988 1364 stripped.exe 26 PID 1364 wrote to memory of 988 1364 stripped.exe 26 PID 1364 wrote to memory of 988 1364 stripped.exe 26 PID 1364 wrote to memory of 988 1364 stripped.exe 26 PID 660 wrote to memory of 1708 660 taskeng.exe 29 PID 660 wrote to memory of 1708 660 taskeng.exe 29 PID 660 wrote to memory of 1708 660 taskeng.exe 29 PID 660 wrote to memory of 1708 660 taskeng.exe 29 PID 660 wrote to memory of 1708 660 taskeng.exe 29 PID 660 wrote to memory of 1708 660 taskeng.exe 29 PID 660 wrote to memory of 1708 660 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\stripped.exe"C:\Users\Admin\AppData\Local\Temp\stripped.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Creates scheduled task(s)
PID:988
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {981D5DE6-BE12-40F8-A171-E01C780BC55F} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exeC:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe2⤵
- Executes dropped EXE
PID:1708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449.1MB
MD5c27d13960023d25ff44dd5485080818a
SHA144b9602c4a13b38ca1e495ce64d82bca3c82f68f
SHA2564f363184012a330e36839ff3c0974d1bbbeaf1cc14ae8c75feae3e939e3bdc1f
SHA512f7fd9bb2250b801e760236120f7eeab04dc1fe49fbc9ceec1068bc914dbcd6dc6bef5dee999915d847ae8855061a335cad2688ed059148e6c488ac5998c23636
-
Filesize
449.2MB
MD5cd3a2b70d960c9003017a35c3b79e6ba
SHA145278ec0df66cfe10478671ddecbb6a02e0aca17
SHA2563d295676991e0b6efa504e5c8986bf23cfb1e9abb1c8e145a26b5faaea08a0cf
SHA51230c978659a7c586836f7c1ea91c175b362c6e25738c65fb3bb4fd68b621de63b82924f9c6173332570d63768fb6d2e33fe4896af94217e47ae5498dae99363df