Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2022, 11:54

General

  • Target

    stripped.exe

  • Size

    239KB

  • MD5

    4efaf3c856cbc3a0a9078e8105c4c2a1

  • SHA1

    5258925002bbc57405578a59375dff67edfdfb6f

  • SHA256

    ec22fe1001066151dcaba55d013dd5a69886ec09d947118a9682f4a673890512

  • SHA512

    4949819f589a6042604879aae0424c9d172cf6e18b1e6ca01a53de6d136249a59fa3fe77e3cac56942499d7c319b7156b83db5c31711d36a58a219808e3a3f2f

  • SSDEEP

    3072:HAcREh6pPlF7LCh8dM7QlBP5o3x8YcwIFU9OImpVYe3d3ROR:PKMpPlfy70zBYcwIe9DkL3pRO

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\stripped.exe
    "C:\Users\Admin\AppData\Local\Temp\stripped.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
      2⤵
      • Creates scheduled task(s)
      PID:988
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {981D5DE6-BE12-40F8-A171-E01C780BC55F} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
      C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
      2⤵
      • Executes dropped EXE
      PID:1708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

    Filesize

    449.1MB

    MD5

    c27d13960023d25ff44dd5485080818a

    SHA1

    44b9602c4a13b38ca1e495ce64d82bca3c82f68f

    SHA256

    4f363184012a330e36839ff3c0974d1bbbeaf1cc14ae8c75feae3e939e3bdc1f

    SHA512

    f7fd9bb2250b801e760236120f7eeab04dc1fe49fbc9ceec1068bc914dbcd6dc6bef5dee999915d847ae8855061a335cad2688ed059148e6c488ac5998c23636

  • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

    Filesize

    449.2MB

    MD5

    cd3a2b70d960c9003017a35c3b79e6ba

    SHA1

    45278ec0df66cfe10478671ddecbb6a02e0aca17

    SHA256

    3d295676991e0b6efa504e5c8986bf23cfb1e9abb1c8e145a26b5faaea08a0cf

    SHA512

    30c978659a7c586836f7c1ea91c175b362c6e25738c65fb3bb4fd68b621de63b82924f9c6173332570d63768fb6d2e33fe4896af94217e47ae5498dae99363df

  • memory/1364-54-0x00000000000F0000-0x0000000000109000-memory.dmp

    Filesize

    100KB

  • memory/1364-55-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB

  • memory/1364-56-0x00000000000F0000-0x0000000000109000-memory.dmp

    Filesize

    100KB

  • memory/1364-58-0x00000000000F0000-0x0000000000109000-memory.dmp

    Filesize

    100KB

  • memory/1708-64-0x0000000000140000-0x0000000000159000-memory.dmp

    Filesize

    100KB