Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/02/2023, 09:43
Behavioral task
behavioral1
Sample
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe
Resource
win7-20220812-en
General
-
Target
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe
-
Size
235KB
-
MD5
6779cd6f17fa7536c4490cc6d72a00a0
-
SHA1
2976ecc0ecc2800be22fa92868c2173a44e04ee0
-
SHA256
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
-
SHA512
88e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
SSDEEP
6144:eLUoeyDABOdDubDXqgraG0JzSRuVyL+VYjQqgE:elu0LgwJ4uVyaV+J
Malware Config
Extracted
amadey
3.66
62.204.41.242/9vZbns/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1980 nbveek.exe 1900 nbveek.exe 1748 nbveek.exe -
Loads dropped DLL 1 IoCs
pid Process 964 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1732 schtasks.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 964 wrote to memory of 1980 964 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe 27 PID 964 wrote to memory of 1980 964 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe 27 PID 964 wrote to memory of 1980 964 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe 27 PID 964 wrote to memory of 1980 964 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe 27 PID 1980 wrote to memory of 1732 1980 nbveek.exe 28 PID 1980 wrote to memory of 1732 1980 nbveek.exe 28 PID 1980 wrote to memory of 1732 1980 nbveek.exe 28 PID 1980 wrote to memory of 1732 1980 nbveek.exe 28 PID 1980 wrote to memory of 1904 1980 nbveek.exe 30 PID 1980 wrote to memory of 1904 1980 nbveek.exe 30 PID 1980 wrote to memory of 1904 1980 nbveek.exe 30 PID 1980 wrote to memory of 1904 1980 nbveek.exe 30 PID 1904 wrote to memory of 1944 1904 cmd.exe 32 PID 1904 wrote to memory of 1944 1904 cmd.exe 32 PID 1904 wrote to memory of 1944 1904 cmd.exe 32 PID 1904 wrote to memory of 1944 1904 cmd.exe 32 PID 1904 wrote to memory of 1996 1904 cmd.exe 33 PID 1904 wrote to memory of 1996 1904 cmd.exe 33 PID 1904 wrote to memory of 1996 1904 cmd.exe 33 PID 1904 wrote to memory of 1996 1904 cmd.exe 33 PID 1904 wrote to memory of 1484 1904 cmd.exe 34 PID 1904 wrote to memory of 1484 1904 cmd.exe 34 PID 1904 wrote to memory of 1484 1904 cmd.exe 34 PID 1904 wrote to memory of 1484 1904 cmd.exe 34 PID 1904 wrote to memory of 996 1904 cmd.exe 35 PID 1904 wrote to memory of 996 1904 cmd.exe 35 PID 1904 wrote to memory of 996 1904 cmd.exe 35 PID 1904 wrote to memory of 996 1904 cmd.exe 35 PID 1904 wrote to memory of 1336 1904 cmd.exe 36 PID 1904 wrote to memory of 1336 1904 cmd.exe 36 PID 1904 wrote to memory of 1336 1904 cmd.exe 36 PID 1904 wrote to memory of 1336 1904 cmd.exe 36 PID 1904 wrote to memory of 1808 1904 cmd.exe 37 PID 1904 wrote to memory of 1808 1904 cmd.exe 37 PID 1904 wrote to memory of 1808 1904 cmd.exe 37 PID 1904 wrote to memory of 1808 1904 cmd.exe 37 PID 820 wrote to memory of 1900 820 taskeng.exe 41 PID 820 wrote to memory of 1900 820 taskeng.exe 41 PID 820 wrote to memory of 1900 820 taskeng.exe 41 PID 820 wrote to memory of 1900 820 taskeng.exe 41 PID 820 wrote to memory of 1748 820 taskeng.exe 42 PID 820 wrote to memory of 1748 820 taskeng.exe 42 PID 820 wrote to memory of 1748 820 taskeng.exe 42 PID 820 wrote to memory of 1748 820 taskeng.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe"C:\Users\Admin\AppData\Local\Temp\b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:1732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"4⤵PID:1996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E4⤵PID:1484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"4⤵PID:1336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E4⤵PID:1808
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {96549507-C4E3-4EC1-AE9F-F232812DCB62} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe2⤵
- Executes dropped EXE
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe2⤵
- Executes dropped EXE
PID:1748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482