Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09/02/2023, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
196KB
-
MD5
610ac369f1ae1bd0f3b864a833436c9b
-
SHA1
4653947d9ed2c390063058e48cd9e8f19ea5f9e9
-
SHA256
1af5805ca8f035123fa89eea0eba3945a9dce47c376ced924501569ae8e5cdc6
-
SHA512
4cbfd9e2850c7a9f70608ea58a1ed37e776f63e3f86a96e768d85988a79dd228c6dadf96d4fd2946a5e7f10abe08d8a35a2f7e9794618b25263dcd3c2704b3c7
-
SSDEEP
3072:UWq9O/I7EkD7zxhL24jWMd5rwbCJb4ZqyborirgvTN82S:pq91Eq3TLRjjVJeqygTtS
Malware Config
Signatures
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1780 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 556 AAKJEGCFBG.exe 1620 ntlhost.exe -
Loads dropped DLL 6 IoCs
pid Process 1888 file.exe 1888 file.exe 1348 cmd.exe 1348 cmd.exe 556 AAKJEGCFBG.exe 556 AAKJEGCFBG.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" AAKJEGCFBG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1248 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1888 file.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1348 1888 file.exe 30 PID 1888 wrote to memory of 1348 1888 file.exe 30 PID 1888 wrote to memory of 1348 1888 file.exe 30 PID 1888 wrote to memory of 1348 1888 file.exe 30 PID 1888 wrote to memory of 1780 1888 file.exe 32 PID 1888 wrote to memory of 1780 1888 file.exe 32 PID 1888 wrote to memory of 1780 1888 file.exe 32 PID 1888 wrote to memory of 1780 1888 file.exe 32 PID 1780 wrote to memory of 1248 1780 cmd.exe 34 PID 1780 wrote to memory of 1248 1780 cmd.exe 34 PID 1780 wrote to memory of 1248 1780 cmd.exe 34 PID 1780 wrote to memory of 1248 1780 cmd.exe 34 PID 1348 wrote to memory of 556 1348 cmd.exe 35 PID 1348 wrote to memory of 556 1348 cmd.exe 35 PID 1348 wrote to memory of 556 1348 cmd.exe 35 PID 1348 wrote to memory of 556 1348 cmd.exe 35 PID 556 wrote to memory of 1620 556 AAKJEGCFBG.exe 36 PID 556 wrote to memory of 1620 556 AAKJEGCFBG.exe 36 PID 556 wrote to memory of 1620 556 AAKJEGCFBG.exe 36 PID 556 wrote to memory of 1620 556 AAKJEGCFBG.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AAKJEGCFBG.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\AAKJEGCFBG.exe"C:\Users\Admin\AppData\Local\Temp\AAKJEGCFBG.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:1620
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\file.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1248
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD58655ca74fed114b9925ad8f0048b31fc
SHA175f10fb149fbcdd8658a18c32a8e95f60365edb1
SHA256dfba7a57e49406ef14f813db2d029715a89004775f20f1a67bd0bca84a5e291b
SHA512f24e714fe87e596461b079801b08a9b13c1cb8ffe70635bfb3e149098061ae24c330536f2374967186c2a8e9f2434868add265607eac6f6d8eb8cd6127eccef8
-
Filesize
1.8MB
MD58655ca74fed114b9925ad8f0048b31fc
SHA175f10fb149fbcdd8658a18c32a8e95f60365edb1
SHA256dfba7a57e49406ef14f813db2d029715a89004775f20f1a67bd0bca84a5e291b
SHA512f24e714fe87e596461b079801b08a9b13c1cb8ffe70635bfb3e149098061ae24c330536f2374967186c2a8e9f2434868add265607eac6f6d8eb8cd6127eccef8
-
Filesize
23.0MB
MD5b6b33a68be063c2bba8f876b2c862f9c
SHA183cac8bc2810f31ef4d9deae84df9b2931d241a1
SHA256aed1117603a5f6de707814bbe45164570f4e638a50a43a20420b326d7e9a6a58
SHA51263cd07a9bbd851aa00eef25c8086fbd43d83422c47de4af5b263ad01593af07646af561265c7a04fa0070ac5133b7806f14f2d8f7f1b40aa51f8e623d8a9cc19
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.8MB
MD58655ca74fed114b9925ad8f0048b31fc
SHA175f10fb149fbcdd8658a18c32a8e95f60365edb1
SHA256dfba7a57e49406ef14f813db2d029715a89004775f20f1a67bd0bca84a5e291b
SHA512f24e714fe87e596461b079801b08a9b13c1cb8ffe70635bfb3e149098061ae24c330536f2374967186c2a8e9f2434868add265607eac6f6d8eb8cd6127eccef8
-
Filesize
1.8MB
MD58655ca74fed114b9925ad8f0048b31fc
SHA175f10fb149fbcdd8658a18c32a8e95f60365edb1
SHA256dfba7a57e49406ef14f813db2d029715a89004775f20f1a67bd0bca84a5e291b
SHA512f24e714fe87e596461b079801b08a9b13c1cb8ffe70635bfb3e149098061ae24c330536f2374967186c2a8e9f2434868add265607eac6f6d8eb8cd6127eccef8
-
Filesize
23.4MB
MD5ae55f2265fb67fe97e29a2429108149e
SHA1397e834db1b8e402a1d6a8f3221f48d70cf2347b
SHA256f2a454d4b925eddab42275e03ad9200abd82f346c60f58e4b2e39f2058f52173
SHA5121ef5d27148c49fdc618193f4d2d4a81e62b160705ad60f3d6d1a26b35a3e40bd52815d343429d953bf0d66656a2f347ca1522e9a88f42c13ec3dd5d6f6f7947d
-
Filesize
28.2MB
MD5e8eb04698db5cee29718ac12e3424c1c
SHA1a18475d33f53650595a88049dd2901cccb8a0be3
SHA2564730a7d03d05413aa731b1046072d92d9888a4f7fae39cc00a8c47ca901dc4a0
SHA51268d53cdda0a1cbd9d5989a8d8ad509164456e8be3a4131aac191d4a12df6d302614ec260d70c232684f4741e1704789cf2661619760328dbf89a7672f24a6726