Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe
Resource
win7-20220812-en
General
-
Target
7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe
-
Size
325KB
-
MD5
ccc9cd1a0772e295f72dbdc593fd1b91
-
SHA1
673cb93a2ad861349df4ec838a27e19e87a05854
-
SHA256
7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
-
SHA512
242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
SSDEEP
3072:v5GRgsjPSgA5h45E17LNxEcsEqUhsSz9gjO8hN9fQomjKgvQ/IeXc4yjLUHy3L6n:v3sjKjJlDswsSh679xmjRvyg6yMTW9x
Malware Config
Extracted
amadey
3.50
193.56.146.243/h8V2cQlbd3/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1152 rovwer.exe 1164 rovwer.exe 332 rovwer.exe -
Loads dropped DLL 2 IoCs
pid Process 1788 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 1788 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 112 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1152 1788 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 27 PID 1788 wrote to memory of 1152 1788 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 27 PID 1788 wrote to memory of 1152 1788 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 27 PID 1788 wrote to memory of 1152 1788 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 27 PID 1152 wrote to memory of 112 1152 rovwer.exe 28 PID 1152 wrote to memory of 112 1152 rovwer.exe 28 PID 1152 wrote to memory of 112 1152 rovwer.exe 28 PID 1152 wrote to memory of 112 1152 rovwer.exe 28 PID 1360 wrote to memory of 1164 1360 taskeng.exe 33 PID 1360 wrote to memory of 1164 1360 taskeng.exe 33 PID 1360 wrote to memory of 1164 1360 taskeng.exe 33 PID 1360 wrote to memory of 1164 1360 taskeng.exe 33 PID 1360 wrote to memory of 332 1360 taskeng.exe 34 PID 1360 wrote to memory of 332 1360 taskeng.exe 34 PID 1360 wrote to memory of 332 1360 taskeng.exe 34 PID 1360 wrote to memory of 332 1360 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe"C:\Users\Admin\AppData\Local\Temp\7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:112
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {95588AF0-B56A-4D72-992F-6215F4CBEA04} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:332
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc