Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/02/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
Resource
win10-20220901-en
General
-
Target
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
-
Size
1.3MB
-
MD5
21fc808d0840be3366ef79e5a15c51a4
-
SHA1
c9c3d63a7fa8f99766fb0560dd14a70e90e57c4a
-
SHA256
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498
-
SHA512
8a31f7f6a13ac29bab131af93908f76434457039d6be69158bbc7991bb73d5871fed2cb16ef68076ba614128fdeb73c30043f038cb4e2f41d1d311c2554361fa
-
SSDEEP
12288:X2hfjFNHUaymttZedE59j8fmVuXQ54jNg6QDloO7pe54ZHW4WASSxqHs9Enat0N+:QjDUaFbwWqW6H5QHWjiqH67V0AMwrdb
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 568 powershell.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 568 powershell.exe Token: SeDebugPrivilege 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1464 wrote to memory of 568 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 28 PID 1464 wrote to memory of 568 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 28 PID 1464 wrote to memory of 568 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 28 PID 1464 wrote to memory of 432 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 31 PID 1464 wrote to memory of 432 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 31 PID 1464 wrote to memory of 432 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 31 PID 1464 wrote to memory of 1240 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 32 PID 1464 wrote to memory of 1240 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 32 PID 1464 wrote to memory of 1240 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 32 PID 1464 wrote to memory of 1712 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 33 PID 1464 wrote to memory of 1712 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 33 PID 1464 wrote to memory of 1712 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 33 PID 1464 wrote to memory of 1092 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 34 PID 1464 wrote to memory of 1092 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 34 PID 1464 wrote to memory of 1092 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 34 PID 1464 wrote to memory of 1156 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 35 PID 1464 wrote to memory of 1156 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 35 PID 1464 wrote to memory of 1156 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 35 PID 1464 wrote to memory of 812 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 36 PID 1464 wrote to memory of 812 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 36 PID 1464 wrote to memory of 812 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 36 PID 1464 wrote to memory of 1904 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 37 PID 1464 wrote to memory of 1904 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 37 PID 1464 wrote to memory of 1904 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 37 PID 1464 wrote to memory of 968 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 38 PID 1464 wrote to memory of 968 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 38 PID 1464 wrote to memory of 968 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 38 PID 1464 wrote to memory of 2012 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 39 PID 1464 wrote to memory of 2012 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 39 PID 1464 wrote to memory of 2012 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 39 PID 1464 wrote to memory of 964 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 40 PID 1464 wrote to memory of 964 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 40 PID 1464 wrote to memory of 964 1464 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe"C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANAA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵PID:964
-