Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe
Resource
win10-20220812-en
General
-
Target
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe
-
Size
1.3MB
-
MD5
dbac267bf7959e4accd9e75b9f93cf8d
-
SHA1
d5e8f6e054338b9dcf6db7a218e4fd84a0c08ebe
-
SHA256
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e
-
SHA512
4ba5528e1e6ad9339168bd3be914d3120e76a6139a68ebf917bea4cf21f45d239e4b73bfe0179bd6e12cb9f95bf9a7342ff2e2b324405a66a80692edd7ca3335
-
SSDEEP
24576:YLeTtjJFtHrK/EqQU2Gq1e8T+TyxvGHMPlLRK5qaHBGb/9JFDLuKYrB59Y:YLYkXU08STy4H6K5BBwze9Y
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1700 rundll32.exe 1700 rundll32.exe 1700 rundll32.exe 1700 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe 536 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1792 1160 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe 28 PID 1160 wrote to memory of 1792 1160 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe 28 PID 1160 wrote to memory of 1792 1160 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe 28 PID 1160 wrote to memory of 1792 1160 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe 28 PID 1792 wrote to memory of 1700 1792 control.exe 29 PID 1792 wrote to memory of 1700 1792 control.exe 29 PID 1792 wrote to memory of 1700 1792 control.exe 29 PID 1792 wrote to memory of 1700 1792 control.exe 29 PID 1792 wrote to memory of 1700 1792 control.exe 29 PID 1792 wrote to memory of 1700 1792 control.exe 29 PID 1792 wrote to memory of 1700 1792 control.exe 29 PID 1700 wrote to memory of 1120 1700 rundll32.exe 30 PID 1700 wrote to memory of 1120 1700 rundll32.exe 30 PID 1700 wrote to memory of 1120 1700 rundll32.exe 30 PID 1700 wrote to memory of 1120 1700 rundll32.exe 30 PID 1120 wrote to memory of 536 1120 RunDll32.exe 31 PID 1120 wrote to memory of 536 1120 RunDll32.exe 31 PID 1120 wrote to memory of 536 1120 RunDll32.exe 31 PID 1120 wrote to memory of 536 1120 RunDll32.exe 31 PID 1120 wrote to memory of 536 1120 RunDll32.exe 31 PID 1120 wrote to memory of 536 1120 RunDll32.exe 31 PID 1120 wrote to memory of 536 1120 RunDll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe"C:\Users\Admin\AppData\Local\Temp\9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",5⤵
- Loads dropped DLL
PID:536
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54