Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/01/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20220812-en
General
-
Target
setup.exe
-
Size
1.3MB
-
MD5
db63ecc446d79141a12cc1dd13fa377e
-
SHA1
28e5812ec18e0c24b1d7a0ae6ab79d824da96e94
-
SHA256
d87bf9447e6782b79e37b29b822b72512e49562231a949ab29674648805f5f36
-
SHA512
f899f117f358d98906c048d8b5a05f50b3c1c6878fb30b0968e370e24f9cc248ff51389480a19c7aee31f66ab37ff282997e3ec07531f404889884898854946a
-
SSDEEP
24576:XxGkHMRU4b5DVAdyweF+a1enVfmpLbcx5QZ:gmctZieFZ14Vg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1668 setup.tmp -
Loads dropped DLL 4 IoCs
pid Process 1392 setup.exe 1668 setup.tmp 1668 setup.tmp 1668 setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1668 1392 setup.exe 27 PID 1392 wrote to memory of 1668 1392 setup.exe 27 PID 1392 wrote to memory of 1668 1392 setup.exe 27 PID 1392 wrote to memory of 1668 1392 setup.exe 27 PID 1392 wrote to memory of 1668 1392 setup.exe 27 PID 1392 wrote to memory of 1668 1392 setup.exe 27 PID 1392 wrote to memory of 1668 1392 setup.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\is-5R05L.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-5R05L.tmp\setup.tmp" /SL5="$60120,484352,0,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD57d237edf2866222fb8bc3c588ff7bcdb
SHA1a6a7d068ef22787bb7bdeefa9bbf127a2045855f
SHA2561106262f62188882d78578f260525c34ad0b3c2e1823915eab207fc9c79fc6fc
SHA512c171fcefb42f24dbb6e3a32463c29d4fb77e61bcda12571939a29b59b1ee72512df8744f3bc60e3436a1b5223a2f60b4325c8070ced07b214b03bc3d36eb8870
-
Filesize
1.5MB
MD57d237edf2866222fb8bc3c588ff7bcdb
SHA1a6a7d068ef22787bb7bdeefa9bbf127a2045855f
SHA2561106262f62188882d78578f260525c34ad0b3c2e1823915eab207fc9c79fc6fc
SHA512c171fcefb42f24dbb6e3a32463c29d4fb77e61bcda12571939a29b59b1ee72512df8744f3bc60e3436a1b5223a2f60b4325c8070ced07b214b03bc3d36eb8870
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3