Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe
Resource
win10v2004-20220812-en
General
-
Target
9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe
-
Size
749KB
-
MD5
420a07c7b5a1a2f57ab84242620df82d
-
SHA1
9651c6084377fe9f44d5e0f1c94b660204da4a8f
-
SHA256
9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b
-
SHA512
a52bda824346c2919677f8ee552c16e9d336a0c51b8984f3cf562a9cae571dcd314e9155fce52a6e37de78136a75fdb793503e14bca7c638a35e33318fbdd945
-
SSDEEP
12288:Q3TD4DnRfwKl++H2QZ/DQHwAU6LjLTPyQ0YDbimiWzO1a0kCnNXSg98M:kTQuKl++H9M3LT/DPTx0kC1yM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1092 regedit.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1292 wrote to memory of 340 1292 9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe 28 PID 1292 wrote to memory of 340 1292 9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe 28 PID 1292 wrote to memory of 340 1292 9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe 28 PID 1292 wrote to memory of 340 1292 9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe 28 PID 1292 wrote to memory of 340 1292 9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe 28 PID 1292 wrote to memory of 340 1292 9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe 28 PID 1292 wrote to memory of 340 1292 9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe 28 PID 340 wrote to memory of 1092 340 cmd.exe 30 PID 340 wrote to memory of 1092 340 cmd.exe 30 PID 340 wrote to memory of 1092 340 cmd.exe 30 PID 340 wrote to memory of 1092 340 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe"C:\Users\Admin\AppData\Local\Temp\9ec6dd25ff17fc47aabae14966f6e4f6952032b04f8325d75567ee392b260b0b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\eastcom\install\Setup2.4.0.41.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\eastcom\install\ECC_URT_XFS_Upd.reg3⤵
- Runs .reg file with regedit
PID:1092
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368B
MD547cb45dc6d0d9a208d1d7d278a6fdb7d
SHA1352c7138cdef9b77ec2c243f7f6189b775636aa0
SHA256ce6fe54c88a45757da9f94bb2aadee359d0317f1fd603f516cd482c3ba911143
SHA512ad434de523d29a1f9e25d084cd3e10bbaef9350eeef7aca7aa90e7b16d8e1e0ef585a8b50952b77f82a909bff6594e8962fc5f2b222dc29cd148de3b3be307d1
-
Filesize
169B
MD5b33374322cc7c0674c8a096f94d25d96
SHA123025187a56052be166cddc4eddb60468a682c3c
SHA256bdebc2f0ee971f43e0a98f6346cf6e7611caa3a37d343cfe5c1f288cbfb17089
SHA512abfa1e4d5eea8a9d6502280c24576123255fb6d50f2d64b53b2b9a58993ba1a53ab1964bc5fd7f0149f07e26cc5cf12ec69eac457aa4e9e6e5bc1afba2761aea