Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/01/2023, 19:12

230131-xwpy7abf5y 8

31/01/2023, 19:10

230131-xvlkdabf5w 8

Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-es
  • resource tags

    arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    31/01/2023, 19:10

General

  • Target

    osu!.exe

  • Size

    4.3MB

  • MD5

    58aed0b0330ca0b78ae291c6d17d890c

  • SHA1

    f1957608185dbc3086e0e1e1c7dec1d3aea92654

  • SHA256

    be5854f78c69dd6b519b618eb57d7572c4ea15ef2dbd66d45d78abf2c3c72baf

  • SHA512

    f5938fa10ede164e80918020d97f8c4a7627bb9cae56980853f41b424e3d9977fd5b1795b1a9a3cd32d3c1bbf141931874e1ed102858d4f2e34d922d7aaa024d

  • SSDEEP

    98304:CWLZg3h2kgwD6JkgIVzLUDQWvnUlNVKsEXXjZzLpxRxpDOhL:CWLZg3h2kgwD6JkgIBUDVnWNVKsEXXj4

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\osu!.exe
    "C:\Users\Admin\AppData\Local\Temp\osu!.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\osu!\osu!.exe
      "C:\Users\Admin\AppData\Local\osu!\osu!.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

    Filesize

    765B

    MD5

    41d6f6a2484acac005dd897acbb8b513

    SHA1

    03f030ad184c2e8c8a72b956f517054d850bdf57

    SHA256

    d261b935332a18706116de550c081bbc590fd5f0540ebd89b600d1016732c93a

    SHA512

    b974f154ac229f408e6d19414a0379d8c6afa118349b38333c6abad3dd1adb42b2c2115d9a0045b83f3c2ad66c1679eac49a383796066295a8ca949f7aa09660

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_C99E84AF904BD8598CB3FED576528926

    Filesize

    637B

    MD5

    c8be0ed856bdd09f38e9284b8472e455

    SHA1

    ad624ea233ecfb7091cf18c9a44b89e541b3fb3a

    SHA256

    98bf31534cd43c36a6a758abe77120d0d9151bf539de3c6bbe137bb3e8905c82

    SHA512

    763d8368b5fe242123468fe2d3d7bf52ab3a2bcf756611b6472f34a8322ab74ca053c0fd0d59a3ea96b5b5aca4f655e5d8789b67aa48076916f52a62d50b4132

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

    Filesize

    1KB

    MD5

    2ba38f38e1bbf7a0b86e4513488af1c9

    SHA1

    fdd898035a413a99a331733240d8a55779d2cedb

    SHA256

    eea4e560cfd565e1ccd40b747e56dea4f40953484c4dab34e346931c1f96365e

    SHA512

    43270b976acd9510871d19695aa14ee9ffec6a1ec900d33afc9bed6f18d56d9d52295379b6b2afba2d3d8dd5467bc5f08566156647b502489fe523913ef7d03c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

    Filesize

    484B

    MD5

    ca734c47856bcbd2139d2c436a60530b

    SHA1

    714baa52649f219bcfa8d9ad5cbb0884a9a3362e

    SHA256

    e5b0d8aa9b1fec39aa4b57d08a56d0edde3a567748924890b2d91304eb431b78

    SHA512

    0327177d8e16b0f6b74dc4e274737ad52d48ace35ba3dd11cbdd6c1c1fd0c4b6afae02e4bf77b13990554dd887be2b998c09459d977d323762ecf6dc304d0e8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4192675b47cb98b908e669683cd2bcb0

    SHA1

    5cb1ebea1959c8792249c62e210f6ce30d86912c

    SHA256

    a3dbd994d9907f10b8de6f10ab85714dc8c7eeaa71761849602ccb529994b260

    SHA512

    4455b1ef0e1eb7ac99386d9df3debb225cd317482938f1fc6ba149f275985afd8c7f1b6e167f7e070e199f8d67c4cebc67f7ccd9845db524f47d57a7fc8c6928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_C99E84AF904BD8598CB3FED576528926

    Filesize

    488B

    MD5

    029be5ab8cf668866e7bd4579922a03b

    SHA1

    c02b2ad89a9f5a9eab2bb2b722fcd574c46f4066

    SHA256

    b0856feba00208d356efc23874d5489ddd31519eabcab6499b5852b7728b47ba

    SHA512

    37472091f71b06bf905df7311e3940921a55d0246d26d3956bef54a624f2264948d0060498136f8dcbc932b7d492fcb3458e5a6339d683110099e3306118cf83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

    Filesize

    482B

    MD5

    60de545e32557835bfa1644b50849a8c

    SHA1

    5cd11519c8bc7d9b023726a44c56f71d1051fa76

    SHA256

    7cd1d212c496915fed0072fe28f09f2977e9f1f97a2746bb17552947383375a3

    SHA512

    5f6eab718c1fb1ae8ba1423781a50154d19544d396c283828596f96cd9367278947b15fcb1ff2760fe5cfd11017b346649ed5088f1935ace6b06cad49909bda7

  • C:\Users\Admin\AppData\Local\osu!\osu!.exe

    Filesize

    4.3MB

    MD5

    58aed0b0330ca0b78ae291c6d17d890c

    SHA1

    f1957608185dbc3086e0e1e1c7dec1d3aea92654

    SHA256

    be5854f78c69dd6b519b618eb57d7572c4ea15ef2dbd66d45d78abf2c3c72baf

    SHA512

    f5938fa10ede164e80918020d97f8c4a7627bb9cae56980853f41b424e3d9977fd5b1795b1a9a3cd32d3c1bbf141931874e1ed102858d4f2e34d922d7aaa024d

  • C:\Users\Admin\AppData\Local\osu!\osu!.exe

    Filesize

    4.3MB

    MD5

    58aed0b0330ca0b78ae291c6d17d890c

    SHA1

    f1957608185dbc3086e0e1e1c7dec1d3aea92654

    SHA256

    be5854f78c69dd6b519b618eb57d7572c4ea15ef2dbd66d45d78abf2c3c72baf

    SHA512

    f5938fa10ede164e80918020d97f8c4a7627bb9cae56980853f41b424e3d9977fd5b1795b1a9a3cd32d3c1bbf141931874e1ed102858d4f2e34d922d7aaa024d

  • \Users\Admin\AppData\Local\osu!\osu!.exe

    Filesize

    4.3MB

    MD5

    58aed0b0330ca0b78ae291c6d17d890c

    SHA1

    f1957608185dbc3086e0e1e1c7dec1d3aea92654

    SHA256

    be5854f78c69dd6b519b618eb57d7572c4ea15ef2dbd66d45d78abf2c3c72baf

    SHA512

    f5938fa10ede164e80918020d97f8c4a7627bb9cae56980853f41b424e3d9977fd5b1795b1a9a3cd32d3c1bbf141931874e1ed102858d4f2e34d922d7aaa024d

  • memory/1456-63-0x0000000001260000-0x00000000016A6000-memory.dmp

    Filesize

    4.3MB

  • memory/1456-73-0x0000000004D45000-0x0000000004D56000-memory.dmp

    Filesize

    68KB

  • memory/2008-54-0x0000000000C20000-0x0000000001066000-memory.dmp

    Filesize

    4.3MB

  • memory/2008-58-0x0000000004F85000-0x0000000004F96000-memory.dmp

    Filesize

    68KB

  • memory/2008-57-0x0000000004F85000-0x0000000004F96000-memory.dmp

    Filesize

    68KB

  • memory/2008-56-0x0000000075691000-0x0000000075693000-memory.dmp

    Filesize

    8KB

  • memory/2008-55-0x0000000000AA0000-0x0000000000ADC000-memory.dmp

    Filesize

    240KB