Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
51a709bfee4438611f3afbe3fd4a9257.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
51a709bfee4438611f3afbe3fd4a9257.exe
Resource
win10v2004-20220812-en
General
-
Target
51a709bfee4438611f3afbe3fd4a9257.exe
-
Size
580KB
-
MD5
51a709bfee4438611f3afbe3fd4a9257
-
SHA1
7352a87e19c7b949643811d50b0a6f0e170cf6ac
-
SHA256
1cf4ca22e9fae2f14ec510910ca68dbe2bdad715af613b391bcb53414ddeb19f
-
SHA512
e5a46cbd165dc71893740d043816f7802dfb5126f2527eadb6372921c14c5477623da493f83da08b0f075ed630fb8ac447358d2590a179bb9ff530b840c33b16
-
SSDEEP
12288:PKqjWycOHr+5n1UxrSAHAhsxwpdBLIartbDA+VI2CZQi6sFIMyYOGqa4c:PKgyTmQyaTBN5k+VI2Cx6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 51a709bfee4438611f3afbe3fd4a9257.exe -
Loads dropped DLL 1 IoCs
pid Process 1268 taskeng.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1496 powershell.exe 2008 51a709bfee4438611f3afbe3fd4a9257.exe 2008 51a709bfee4438611f3afbe3fd4a9257.exe 2008 51a709bfee4438611f3afbe3fd4a9257.exe 2008 51a709bfee4438611f3afbe3fd4a9257.exe 2008 51a709bfee4438611f3afbe3fd4a9257.exe 2008 51a709bfee4438611f3afbe3fd4a9257.exe 2008 51a709bfee4438611f3afbe3fd4a9257.exe 328 powershell.exe 328 powershell.exe 328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2012 51a709bfee4438611f3afbe3fd4a9257.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 2008 51a709bfee4438611f3afbe3fd4a9257.exe Token: SeDebugPrivilege 328 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1496 2012 51a709bfee4438611f3afbe3fd4a9257.exe 28 PID 2012 wrote to memory of 1496 2012 51a709bfee4438611f3afbe3fd4a9257.exe 28 PID 2012 wrote to memory of 1496 2012 51a709bfee4438611f3afbe3fd4a9257.exe 28 PID 1268 wrote to memory of 2008 1268 taskeng.exe 31 PID 1268 wrote to memory of 2008 1268 taskeng.exe 31 PID 1268 wrote to memory of 2008 1268 taskeng.exe 31 PID 2008 wrote to memory of 328 2008 51a709bfee4438611f3afbe3fd4a9257.exe 33 PID 2008 wrote to memory of 328 2008 51a709bfee4438611f3afbe3fd4a9257.exe 33 PID 2008 wrote to memory of 328 2008 51a709bfee4438611f3afbe3fd4a9257.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a709bfee4438611f3afbe3fd4a9257.exe"C:\Users\Admin\AppData\Local\Temp\51a709bfee4438611f3afbe3fd4a9257.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5491C51E-B79D-4CEC-9F4D-BC6808B96BF7} S-1-5-21-1214520366-621468234-4062160515-1000:VDWSWJJD\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Roaming\51a709bfee4438611f3afbe3fd4a9257.exeC:\Users\Admin\AppData\Roaming\51a709bfee4438611f3afbe3fd4a9257.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 5; Stop-Process 2008 -Force; Start-Sleep -Seconds 2; Remove-Item "C:\Users\Admin\AppData\Roaming\51a709bfee4438611f3afbe3fd4a9257.exe" -Force3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
580KB
MD551a709bfee4438611f3afbe3fd4a9257
SHA17352a87e19c7b949643811d50b0a6f0e170cf6ac
SHA2561cf4ca22e9fae2f14ec510910ca68dbe2bdad715af613b391bcb53414ddeb19f
SHA512e5a46cbd165dc71893740d043816f7802dfb5126f2527eadb6372921c14c5477623da493f83da08b0f075ed630fb8ac447358d2590a179bb9ff530b840c33b16
-
Filesize
580KB
MD551a709bfee4438611f3afbe3fd4a9257
SHA17352a87e19c7b949643811d50b0a6f0e170cf6ac
SHA2561cf4ca22e9fae2f14ec510910ca68dbe2bdad715af613b391bcb53414ddeb19f
SHA512e5a46cbd165dc71893740d043816f7802dfb5126f2527eadb6372921c14c5477623da493f83da08b0f075ed630fb8ac447358d2590a179bb9ff530b840c33b16
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5be78ee559badb7f6130cea8b43b83231
SHA187a22f420f82798f50032354e0509ef9a4c2ca4d
SHA256ce9238ee57bf38898c3ce65b5302b22f1eaceaf7a0d112c465f7d3298e75f383
SHA5128d3c0bc658f1c737f7d80b4d42b138977c9ff83cf57af689c114f77cb13a967d30353e24b6bfb5e45cf77a507ef3e9ff41260bd8b9c9aa17933513bbb6cb5f4c
-
Filesize
580KB
MD551a709bfee4438611f3afbe3fd4a9257
SHA17352a87e19c7b949643811d50b0a6f0e170cf6ac
SHA2561cf4ca22e9fae2f14ec510910ca68dbe2bdad715af613b391bcb53414ddeb19f
SHA512e5a46cbd165dc71893740d043816f7802dfb5126f2527eadb6372921c14c5477623da493f83da08b0f075ed630fb8ac447358d2590a179bb9ff530b840c33b16