Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/01/2023, 01:34

General

  • Target

    8c72bdf5ce56daa59a0179d8887bf9f9f25f6ab2fcac9e6a37822b5de41aefc6.exe

  • Size

    353KB

  • MD5

    caefcbff399930fc8d852ce6694e87d9

  • SHA1

    2a62a955b96d07c00a1e68aab2d9d4326ba93f84

  • SHA256

    8c72bdf5ce56daa59a0179d8887bf9f9f25f6ab2fcac9e6a37822b5de41aefc6

  • SHA512

    a7a0ce84dc43b9567a9578ed153123cdd408fa5f7799c539b30aeb43e0946a35e83615e1a2d19872b6b9927308e9e6fba5abfcee9c63ccb86d308a07da055247

  • SSDEEP

    6144:ZaqxDnHyiNbLgKEof6XURHv8sjWjMS/s6Gzi6Wb:ZaqxDnS8U5oxHPOE68i

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c72bdf5ce56daa59a0179d8887bf9f9f25f6ab2fcac9e6a37822b5de41aefc6.exe
    "C:\Users\Admin\AppData\Local\Temp\8c72bdf5ce56daa59a0179d8887bf9f9f25f6ab2fcac9e6a37822b5de41aefc6.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4792
  • C:\Users\Admin\AppData\Local\Temp\F254.exe
    C:\Users\Admin\AppData\Local\Temp\F254.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 15567
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4132
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3524

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\F254.exe

      Filesize

      1.1MB

      MD5

      dcbc5a70b4e08eaa9cc8a5d5f082bb2f

      SHA1

      2a011ebdb768f1bcc2d6d81f4bf7dd726975c603

      SHA256

      3d4fc663c27c5068d17d1237ca674416457708e18301db8514f334d22e6aabd8

      SHA512

      835be5dec8a97c92feb64a457546a8dda78bba3d28a90d7fb281bb6354d1818d135fbd0959209abd82093116a1f4a5c9b2f9e02972b97a0bafbcb4ba66323d85

    • C:\Users\Admin\AppData\Local\Temp\F254.exe

      Filesize

      1.1MB

      MD5

      dcbc5a70b4e08eaa9cc8a5d5f082bb2f

      SHA1

      2a011ebdb768f1bcc2d6d81f4bf7dd726975c603

      SHA256

      3d4fc663c27c5068d17d1237ca674416457708e18301db8514f334d22e6aabd8

      SHA512

      835be5dec8a97c92feb64a457546a8dda78bba3d28a90d7fb281bb6354d1818d135fbd0959209abd82093116a1f4a5c9b2f9e02972b97a0bafbcb4ba66323d85

    • C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp

      Filesize

      714KB

      MD5

      9dd70d24b2657a9254b9fd536a4d06d5

      SHA1

      348a1d210d7c4daef8ecdb692eadf3975971e8ee

      SHA256

      d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd

      SHA512

      dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6

    • \Users\Admin\AppData\Local\Temp\Wtfoiq.tmp

      Filesize

      714KB

      MD5

      9dd70d24b2657a9254b9fd536a4d06d5

      SHA1

      348a1d210d7c4daef8ecdb692eadf3975971e8ee

      SHA256

      d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd

      SHA512

      dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6

    • memory/1968-320-0x0000000006960000-0x00000000074A1000-memory.dmp

      Filesize

      11.3MB

    • memory/1968-317-0x0000000006519000-0x000000000651B000-memory.dmp

      Filesize

      8KB

    • memory/1968-303-0x0000000006960000-0x00000000074A1000-memory.dmp

      Filesize

      11.3MB

    • memory/4132-319-0x0000014CF9FA0000-0x0000014CFA252000-memory.dmp

      Filesize

      2.7MB

    • memory/4132-318-0x0000000000C50000-0x0000000000EF1000-memory.dmp

      Filesize

      2.6MB

    • memory/4792-153-0x0000000000400000-0x000000000301B000-memory.dmp

      Filesize

      44.1MB

    • memory/4792-141-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-124-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-125-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-126-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-127-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-128-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-129-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-130-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-131-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-133-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-134-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-135-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-136-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-137-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-132-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-138-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-139-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-140-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-121-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-142-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-143-0x00000000032EA000-0x0000000003300000-memory.dmp

      Filesize

      88KB

    • memory/4792-145-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-144-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-146-0x0000000003020000-0x000000000316A000-memory.dmp

      Filesize

      1.3MB

    • memory/4792-147-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-148-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-149-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-150-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-151-0x0000000000400000-0x000000000301B000-memory.dmp

      Filesize

      44.1MB

    • memory/4792-152-0x00000000032EA000-0x0000000003300000-memory.dmp

      Filesize

      88KB

    • memory/4792-122-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-116-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-117-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-118-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-119-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-120-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4792-123-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-160-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-162-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-164-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-165-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-167-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-168-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-169-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-170-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-166-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-171-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-172-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-173-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-174-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-175-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-176-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-177-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-178-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-180-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-181-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-182-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-183-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-184-0x0000000004D80000-0x0000000004E5F000-memory.dmp

      Filesize

      892KB

    • memory/4844-185-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-187-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-186-0x0000000004F60000-0x0000000005075000-memory.dmp

      Filesize

      1.1MB

    • memory/4844-188-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-189-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-190-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-161-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-159-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-157-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-158-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-156-0x00000000777D0000-0x000000007795E000-memory.dmp

      Filesize

      1.6MB

    • memory/4844-195-0x0000000000400000-0x00000000030DA000-memory.dmp

      Filesize

      44.9MB

    • memory/4844-210-0x0000000000400000-0x00000000030DA000-memory.dmp

      Filesize

      44.9MB