Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2023, 18:53

General

  • Target

    cf04ba4779867c0726c69e230e145fd8.exe

  • Size

    1.1MB

  • MD5

    cf04ba4779867c0726c69e230e145fd8

  • SHA1

    ce8a5522d32cee3d9da5584d432f61b1e122cbc8

  • SHA256

    d3eef85b7fc5291b76a569864b5e35b471d838b897a9c4f73915698b1826d4bd

  • SHA512

    7b800b136a4356bcfe51d6709b623c8467b16fc0d5b4df07eeac8e045cedf39b2df55318c08d25b2e276559e8abce293f97c1862e4505cc6b4c8e1d24713f877

  • SSDEEP

    24576:Wm9ficCrmX9mZgOLxfW6CAEerBf1K3Ey4IFy6kwHideoZCjBE:WmBPnX9pWyAEQBf1XRIFy6kwH+RC9E

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf04ba4779867c0726c69e230e145fd8.exe
    "C:\Users\Admin\AppData\Local\Temp\cf04ba4779867c0726c69e230e145fd8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ryfererfh.tmp",Fwpthq
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 22814
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1356
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k LocalService
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\microsoft analysis services\as oledb\bib.dll",l1w7UFo=
      2⤵
      • Loads dropped DLL
      • Checks processor information in registry
      PID:1580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\AdobeESDGlobalApps.xml

    Filesize

    279B

    MD5

    08a872b713c4f7f847de6f9c1d7d3457

    SHA1

    d819edc8b277f736d4a8c71c4986955b66ebf820

    SHA256

    13f545fe6bb8251d84518c8261df0bae28f8dbab3ecd3ebd25a89c7da5a75e54

    SHA512

    1555355aa76bae5dada97e66483767dd8fa1e7047646bef3553c5720ee0390660c313a27559ec3571dcc3d3c4ffdde4c91346591abbca22257206277ff589c0a

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\CiAD0001.000

    Filesize

    240B

    MD5

    7ca2da6f1e7bca562d7d9376700a912f

    SHA1

    67feaa004013eee76282e3b3fc196279f2577dcb

    SHA256

    04fd7654331261ff9ec331c31b238ba7770f082abfb817d7881813ec02084a4e

    SHA512

    4f2f67dee86af03dae15145649f5eb65cd158686381d26005b91aab89f017b692289050f0b1def00f8c2e724aedba4025db0baa6b55f76d402ded8006c48b38d

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\Iipyptyehff.tmp

    Filesize

    3.5MB

    MD5

    dfa85219d72eb793929f5d2357a729b4

    SHA1

    606082bbae8c2b1a1ad2f3abfb8a825997cf601b

    SHA256

    b2f970db335235e1413b27d2d355114a30a7f0e69b03d440598ac2ff0007c713

    SHA512

    d25911d84458aa1eba85a44dd7ed71e8429c57e77471df4c2a303ecf584bedf0fb62def2e2b91e379b59d87c16053edd1cb598a816dca120092a5a9dccff6231

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\MOR6INT.REST.trx_dll

    Filesize

    48KB

    MD5

    b22a432ea8c671f119cf8285d1021671

    SHA1

    3346593a9adb233233509247b1df059742f6aa3e

    SHA256

    bfd9148c099dfd9477204806df55034d06c9aacf3a4241ab97c4e4acb0349b17

    SHA512

    361badcd731f078d1bd64e61709f183e73163a1a09e1ed543e56a9c57b2bd28c930111797692c6be4ce4bea17a5e8283fec6ac27db7bd078047552dc51e5dece

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\Mobility Center.lnk

    Filesize

    1KB

    MD5

    5504842b4637f94be24a026ddc40c2cb

    SHA1

    e9d78aef854aa2933c5773bb16ec048de1dfa22d

    SHA256

    c3bbcf5ef157ab4806afe59641114381c43447988e74e5eb3113fa8893d1ab55

    SHA512

    8e256d4000c097780167081c38ecf03180f6f812cc68910f210c570119a19d36442d2929786bea7b5a16d4c579d846d81dd7cf7a2a7c13832b477a71423b5430

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\OUTLLIBR.REST.trx_dll

    Filesize

    665KB

    MD5

    753df8b9141a1939d4454d07aed78e06

    SHA1

    514d203a4a8e8a26c8def2c4c21d34da7c5a8243

    SHA256

    91f6c4f198a868abbd3f7cf31373d8e65618092f680be3304b77d66fedabb7d0

    SHA512

    d280ed303c8e51dc5b60357a83839d1ad4ac5ced836422649c88616063e46b88c5c713707b448e192a5b429ac815c8d3eeff27fbb3dbf1b373414cee8e3ee880

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\PUB6INTL.REST.trx_dll

    Filesize

    568KB

    MD5

    30af748c7751fca8078e5c05bf36467b

    SHA1

    db9eacbd6438b07446d3a6c1206e813b8222a10e

    SHA256

    c1ff437693e66a412fa3452ca4038bc32d406153dac55dac7c28c62543640081

    SHA512

    acc75a6bb148ef7b9e9f90ecb53f13c983507c755b76405b6a4cfdb5758171e41484d7360e22d9e38968d5fb80bf4377b7b0cde7068e3fc5f7d0f6c9f50d3c34

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\Remote Desktop Connection.lnk

    Filesize

    1KB

    MD5

    087d72ec6ad575e565930332c599bccc

    SHA1

    ea98bc158e01a79d1d8a6f6ace0323400f54bbce

    SHA256

    55a99005d64d7b755da0ea49cf14a1c7c07348b9eabc7fae613264827840f501

    SHA512

    b2e06a37e7a9f58c3f514eb80dd36e6a293dae6de5afeb77be6c7122ee76d9dfe2cde93ea68e777030bda4af3dbebd299a44e76fb84e6013e653110f3bf2f141

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\folder.ico

    Filesize

    52KB

    MD5

    bbf9dbdc079c0cd95f78d728aa3912d4

    SHA1

    051f76cc8c6520768bac9559bb329abeebd70d7c

    SHA256

    bef53904908769ceeb60f8e0976c3194e73534f00f4afb65497c2091121b98b2

    SHA512

    af110c52c983f1cf55b3db7d375e03c8c9308e3cf9ee1c154c2b25cb3f8299f0c0ba87b47445f09f98659eb536184c245887a341733c11af713e9ecc15288b5d

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\print_property.ico

    Filesize

    58KB

    MD5

    30d7062e069bc0a9b34f4034090c1aae

    SHA1

    e5fcedd8e4cc0463c0bc6912b1791f2876e28a61

    SHA256

    24e77f244b0743e311b0fc97f06513a0cecf6560e92f9c6f164288a152d32000

    SHA512

    85dd6c916d48804a24dbbad0f4b4842453ac31a692905f8f2f34112eaa1bbf062a825d45ed5d800bbc4663a28b0b5003ebd5fa54991cf846f1028e929ea06de6

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\usertile29.bmp

    Filesize

    48KB

    MD5

    6a944c920d471248013a35096b1ce218

    SHA1

    00a1267a6e631710fc71eb2e2e590e0c693296de

    SHA256

    75de8e9eb7a045c484cdac6b3fd30fda99ee17cda8d0310897d0b73c2d1c4f87

    SHA512

    ec0a24dd41958b09e20e7366835ac0f938a45140ebd6915188c206fdbb8e9f728fbe50bb6e242d0804e7e693d4433b2fac586c7a3fb79de329416ad7731d9269

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\usertile43.bmp

    Filesize

    48KB

    MD5

    bf54b355d171471bece614e6583488b2

    SHA1

    3556f13234855d9c74d7100d8d3c229a496f7f72

    SHA256

    6403db3597d8f33188d0fe0cc1ff166c7cf91df5c6f19db36002eb6b5481c892

    SHA512

    50f4c61a86e1593f791c5bd9feab43ce63b162212815594de7057bb8038b65ed9efd41cd6e38e62bf644c6f23953b0c10ebf6d8afc08ef9b62c77806aff98fd6

  • C:\ProgramData\{0482906F-92EB-6EE9-44E0-8924BCBAD1D2}\{61109F13-CFED-4AFC-BAA0-C13E433CFBD6}.2.ver0x0000000000000002.db

    Filesize

    1KB

    MD5

    6c110640512eac388faae8fc7956454a

    SHA1

    b6233758a281a86bb5742667bf5723653c475c81

    SHA256

    2b8578afb4557e42e414b1e73f8acc6050da49a8c6f9ddb9fa71d906a58a9def

    SHA512

    7f54fa05208d5ac86aad2e63f4e87ec7258f6da88444eb6529a85a875d64f18c6176f4977b956dee54250f356e780beb1f719ba10de3c1fc6194f5ebf4e5cd74

  • C:\Users\Admin\AppData\Local\Temp\Ryfererfh.tmp

    Filesize

    817KB

    MD5

    0a6c58fc386c9a4d7d43b809447f3eac

    SHA1

    b07d0ae1180e21bf79b3b720d9e03e2b7982972d

    SHA256

    d71c0aaec63294fb11af30ff408e94b5fff656149da01e3f7a97e3026580d5c2

    SHA512

    e2d08ae110f30257daa9341d1e3c91d6c50f6b32107d1e1ca0badcce872d09ac3d3a3998f26b1f93c3b1937317ce5ea240652d1b784c5a4d2e30273c19a9b6ad

  • \??\c:\program files (x86)\microsoft analysis services\as oledb\bib.dll

    Filesize

    817KB

    MD5

    f76a028fdf663558384337edb665bb25

    SHA1

    fcf6f8d9090e4e86dd121b806344f91d2e505c15

    SHA256

    83b2961e849f956b9689f7424a8a6937f77fdb9519f4d49cf9ec7346a62e2624

    SHA512

    34ce2dcbbabfd9750c8cbc288947d9530f78b78aab5d82b378ccd567af3360607c6372edb2ca33e7ff770fa7c4ea310bcab3f19bef13e58b8a676684277215d7

  • \Program Files (x86)\Microsoft Analysis Services\AS OLEDB\BIB.dll

    Filesize

    817KB

    MD5

    f76a028fdf663558384337edb665bb25

    SHA1

    fcf6f8d9090e4e86dd121b806344f91d2e505c15

    SHA256

    83b2961e849f956b9689f7424a8a6937f77fdb9519f4d49cf9ec7346a62e2624

    SHA512

    34ce2dcbbabfd9750c8cbc288947d9530f78b78aab5d82b378ccd567af3360607c6372edb2ca33e7ff770fa7c4ea310bcab3f19bef13e58b8a676684277215d7

  • \Program Files (x86)\Microsoft Analysis Services\AS OLEDB\BIB.dll

    Filesize

    817KB

    MD5

    f76a028fdf663558384337edb665bb25

    SHA1

    fcf6f8d9090e4e86dd121b806344f91d2e505c15

    SHA256

    83b2961e849f956b9689f7424a8a6937f77fdb9519f4d49cf9ec7346a62e2624

    SHA512

    34ce2dcbbabfd9750c8cbc288947d9530f78b78aab5d82b378ccd567af3360607c6372edb2ca33e7ff770fa7c4ea310bcab3f19bef13e58b8a676684277215d7

  • \Program Files (x86)\Microsoft Analysis Services\AS OLEDB\BIB.dll

    Filesize

    817KB

    MD5

    f76a028fdf663558384337edb665bb25

    SHA1

    fcf6f8d9090e4e86dd121b806344f91d2e505c15

    SHA256

    83b2961e849f956b9689f7424a8a6937f77fdb9519f4d49cf9ec7346a62e2624

    SHA512

    34ce2dcbbabfd9750c8cbc288947d9530f78b78aab5d82b378ccd567af3360607c6372edb2ca33e7ff770fa7c4ea310bcab3f19bef13e58b8a676684277215d7

  • \Program Files (x86)\Microsoft Analysis Services\AS OLEDB\BIB.dll

    Filesize

    817KB

    MD5

    f76a028fdf663558384337edb665bb25

    SHA1

    fcf6f8d9090e4e86dd121b806344f91d2e505c15

    SHA256

    83b2961e849f956b9689f7424a8a6937f77fdb9519f4d49cf9ec7346a62e2624

    SHA512

    34ce2dcbbabfd9750c8cbc288947d9530f78b78aab5d82b378ccd567af3360607c6372edb2ca33e7ff770fa7c4ea310bcab3f19bef13e58b8a676684277215d7

  • \Program Files (x86)\Microsoft Analysis Services\AS OLEDB\BIB.dll

    Filesize

    817KB

    MD5

    f76a028fdf663558384337edb665bb25

    SHA1

    fcf6f8d9090e4e86dd121b806344f91d2e505c15

    SHA256

    83b2961e849f956b9689f7424a8a6937f77fdb9519f4d49cf9ec7346a62e2624

    SHA512

    34ce2dcbbabfd9750c8cbc288947d9530f78b78aab5d82b378ccd567af3360607c6372edb2ca33e7ff770fa7c4ea310bcab3f19bef13e58b8a676684277215d7

  • \Program Files\Mozilla Firefox\firefox.exe

    Filesize

    562KB

    MD5

    d388df6ed5ccbf1acdeda5af2d18cb0b

    SHA1

    124d3c2ba93644ac6c2d7253de242b46be836692

    SHA256

    8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

    SHA512

    f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

  • \Program Files\Mozilla Firefox\firefox.exe

    Filesize

    562KB

    MD5

    d388df6ed5ccbf1acdeda5af2d18cb0b

    SHA1

    124d3c2ba93644ac6c2d7253de242b46be836692

    SHA256

    8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

    SHA512

    f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

  • \Program Files\Mozilla Firefox\firefox.exe

    Filesize

    562KB

    MD5

    d388df6ed5ccbf1acdeda5af2d18cb0b

    SHA1

    124d3c2ba93644ac6c2d7253de242b46be836692

    SHA256

    8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

    SHA512

    f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

  • \Program Files\Mozilla Firefox\firefox.exe

    Filesize

    562KB

    MD5

    d388df6ed5ccbf1acdeda5af2d18cb0b

    SHA1

    124d3c2ba93644ac6c2d7253de242b46be836692

    SHA256

    8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

    SHA512

    f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

  • \Program Files\Mozilla Firefox\firefox.exe

    Filesize

    562KB

    MD5

    d388df6ed5ccbf1acdeda5af2d18cb0b

    SHA1

    124d3c2ba93644ac6c2d7253de242b46be836692

    SHA256

    8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

    SHA512

    f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

  • \Program Files\Mozilla Firefox\firefox.exe

    Filesize

    562KB

    MD5

    d388df6ed5ccbf1acdeda5af2d18cb0b

    SHA1

    124d3c2ba93644ac6c2d7253de242b46be836692

    SHA256

    8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

    SHA512

    f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

  • \Users\Admin\AppData\Local\Temp\Ryfererfh.tmp

    Filesize

    817KB

    MD5

    0a6c58fc386c9a4d7d43b809447f3eac

    SHA1

    b07d0ae1180e21bf79b3b720d9e03e2b7982972d

    SHA256

    d71c0aaec63294fb11af30ff408e94b5fff656149da01e3f7a97e3026580d5c2

    SHA512

    e2d08ae110f30257daa9341d1e3c91d6c50f6b32107d1e1ca0badcce872d09ac3d3a3998f26b1f93c3b1937317ce5ea240652d1b784c5a4d2e30273c19a9b6ad

  • memory/1212-72-0x00000000043F0000-0x0000000004530000-memory.dmp

    Filesize

    1.2MB

  • memory/1212-73-0x00000000042B0000-0x00000000043F0000-memory.dmp

    Filesize

    1.2MB

  • memory/1212-81-0x00000000048F0000-0x000000000544A000-memory.dmp

    Filesize

    11.4MB

  • memory/1212-63-0x00000000048F0000-0x000000000544A000-memory.dmp

    Filesize

    11.4MB

  • memory/1212-65-0x00000000048F0000-0x000000000544A000-memory.dmp

    Filesize

    11.4MB

  • memory/1212-66-0x00000000048F0000-0x000000000544A000-memory.dmp

    Filesize

    11.4MB

  • memory/1212-67-0x00000000042B0000-0x00000000043F0000-memory.dmp

    Filesize

    1.2MB

  • memory/1212-68-0x00000000042B0000-0x00000000043F0000-memory.dmp

    Filesize

    1.2MB

  • memory/1212-69-0x00000000043F0000-0x0000000004530000-memory.dmp

    Filesize

    1.2MB

  • memory/1212-74-0x00000000042B0000-0x00000000043F0000-memory.dmp

    Filesize

    1.2MB

  • memory/1356-77-0x0000000002300000-0x0000000002440000-memory.dmp

    Filesize

    1.2MB

  • memory/1356-78-0x000007FEFC451000-0x000007FEFC453000-memory.dmp

    Filesize

    8KB

  • memory/1356-80-0x0000000002050000-0x00000000022FA000-memory.dmp

    Filesize

    2.7MB

  • memory/1356-70-0x0000000000220000-0x00000000004B9000-memory.dmp

    Filesize

    2.6MB

  • memory/1356-76-0x0000000002300000-0x0000000002440000-memory.dmp

    Filesize

    1.2MB

  • memory/1356-79-0x0000000000220000-0x00000000004B9000-memory.dmp

    Filesize

    2.6MB

  • memory/1580-108-0x00000000041A0000-0x0000000004CFA000-memory.dmp

    Filesize

    11.4MB

  • memory/1580-110-0x00000000041A0000-0x0000000004CFA000-memory.dmp

    Filesize

    11.4MB

  • memory/1580-111-0x00000000041A0000-0x0000000004CFA000-memory.dmp

    Filesize

    11.4MB

  • memory/1960-86-0x0000000004240000-0x0000000004D9A000-memory.dmp

    Filesize

    11.4MB

  • memory/1960-90-0x0000000004240000-0x0000000004D9A000-memory.dmp

    Filesize

    11.4MB

  • memory/1960-88-0x0000000004240000-0x0000000004D9A000-memory.dmp

    Filesize

    11.4MB

  • memory/1960-118-0x0000000004240000-0x0000000004D9A000-memory.dmp

    Filesize

    11.4MB

  • memory/2036-54-0x0000000000300000-0x00000000003E9000-memory.dmp

    Filesize

    932KB

  • memory/2036-62-0x0000000000400000-0x0000000002C86000-memory.dmp

    Filesize

    40.5MB

  • memory/2036-58-0x00000000046A0000-0x00000000047CC000-memory.dmp

    Filesize

    1.2MB

  • memory/2036-57-0x0000000000300000-0x00000000003E9000-memory.dmp

    Filesize

    932KB

  • memory/2036-55-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB