Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2023, 04:48

General

  • Target

    9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe

  • Size

    1.3MB

  • MD5

    dbac267bf7959e4accd9e75b9f93cf8d

  • SHA1

    d5e8f6e054338b9dcf6db7a218e4fd84a0c08ebe

  • SHA256

    9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e

  • SHA512

    4ba5528e1e6ad9339168bd3be914d3120e76a6139a68ebf917bea4cf21f45d239e4b73bfe0179bd6e12cb9f95bf9a7342ff2e2b324405a66a80692edd7ca3335

  • SSDEEP

    24576:YLeTtjJFtHrK/EqQU2Gq1e8T+TyxvGHMPlLRK5qaHBGb/9JFDLuKYrB59Y:YLYkXU08STy4H6K5BBwze9Y

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe
    "C:\Users\Admin\AppData\Local\Temp\9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",
            5⤵
            • Loads dropped DLL
            PID:536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • \Users\Admin\AppData\Local\Temp\eGhoI.cpl

    Filesize

    1.4MB

    MD5

    c3a80081bac922d380a57398df69b988

    SHA1

    7b166e714d46c820e8e5d19563ab21c98d637450

    SHA256

    451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91

    SHA512

    f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54

  • memory/536-81-0x0000000001E70000-0x0000000001FD7000-memory.dmp

    Filesize

    1.4MB

  • memory/536-84-0x0000000000190000-0x0000000000196000-memory.dmp

    Filesize

    24KB

  • memory/536-86-0x00000000027D0000-0x0000000002898000-memory.dmp

    Filesize

    800KB

  • memory/1160-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB

  • memory/1700-69-0x0000000001FA0000-0x0000000002080000-memory.dmp

    Filesize

    896KB

  • memory/1700-70-0x00000000024D0000-0x0000000002598000-memory.dmp

    Filesize

    800KB

  • memory/1700-68-0x00000000000D0000-0x00000000000D6000-memory.dmp

    Filesize

    24KB

  • memory/1700-65-0x0000000002360000-0x00000000024C7000-memory.dmp

    Filesize

    1.4MB