Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    599s
  • max time network
    599s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 11:23

General

  • Target

    Specification.exe

  • Size

    295KB

  • MD5

    6c4166241e9dd7e55249cf4d9dedba3a

  • SHA1

    a052f58f9a348cf693d80c6831dfc885baec23ef

  • SHA256

    2cbadf3f08bde65e99a75e12eb5a7eba6290bb6159a9850001b5a0f90b289c0e

  • SHA512

    4fe962dcaf993fc39cb9538d05a0433f968ad642c96df7f38aac0051afd2bbf210b306dc4b838673c9ad65dcdde42f724e183ee2cc6e75afd983b78eda5d23b7

  • SSDEEP

    6144:PYa69oq/ZRMDmB5n7E+gf7U0FNbWE+z9T87vjV3oQ5eqP+p8c26M:PYfo8ZODmHgbo0FgEiJ8B3oQ5eqP+pKN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\Specification.exe
      "C:\Users\Admin\AppData\Local\Temp\Specification.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe
        "C:\Users\Admin\AppData\Local\Temp\tvjkel.exe" C:\Users\Admin\AppData\Local\Temp\mctzftild.g
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:888
        • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe
          "C:\Users\Admin\AppData\Local\Temp\tvjkel.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1292
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1472
      • C:\Windows\SysWOW64\raserver.exe
        "C:\Windows\SysWOW64\raserver.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1944

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\lplasygsf.ysb

        Filesize

        205KB

        MD5

        6f8d0a6210134e21cb2a9bdf3dd07217

        SHA1

        6af61771f92d3ea7ddeef0151202f44fa9eb67a8

        SHA256

        793a48ce824dc6547c37f5079ee989febb5079f5682ece6d6305966d4cc3a67b

        SHA512

        c9a140fc522ef82db93cafc728e0d8c45530b6c2ac3166447548ef8267b0e69e1bc46ce86c5c67fef03cdc56bd3b963fceb7d67eac2a34564a3942d592b38959

      • C:\Users\Admin\AppData\Local\Temp\mctzftild.g

        Filesize

        5KB

        MD5

        a156959c4196968969edf33fa299053d

        SHA1

        64c987d8a657eb99aa78ecb77d4fac6f1732110d

        SHA256

        1e96299e2b0c7f446214497c0bc9926c4ad8ac8b2a1555c5c3b08cc57f427507

        SHA512

        3cfb6d230ddf431f6dfc6bc493a02f9514f76528d7d3bd6ada23647b81677f46224f5af361868de624ee73bb2079c62cbdf855c66c8df2d0ef8795377f369de7

      • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe

        Filesize

        101KB

        MD5

        47f16d991abe4a7ca791e761f473d7d8

        SHA1

        12b35684609eb4b63c989e10cc2edbf099bc777e

        SHA256

        2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

        SHA512

        1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

      • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe

        Filesize

        101KB

        MD5

        47f16d991abe4a7ca791e761f473d7d8

        SHA1

        12b35684609eb4b63c989e10cc2edbf099bc777e

        SHA256

        2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

        SHA512

        1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

      • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe

        Filesize

        101KB

        MD5

        47f16d991abe4a7ca791e761f473d7d8

        SHA1

        12b35684609eb4b63c989e10cc2edbf099bc777e

        SHA256

        2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

        SHA512

        1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

      • \Users\Admin\AppData\Local\Temp\sqlite3.dll

        Filesize

        927KB

        MD5

        7fd80b1cc72dc580c02ca4cfbfb2592d

        SHA1

        18da905af878b27151b359cf1a7d0a650764e8a1

        SHA256

        1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

        SHA512

        13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

      • \Users\Admin\AppData\Local\Temp\tvjkel.exe

        Filesize

        101KB

        MD5

        47f16d991abe4a7ca791e761f473d7d8

        SHA1

        12b35684609eb4b63c989e10cc2edbf099bc777e

        SHA256

        2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

        SHA512

        1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

      • \Users\Admin\AppData\Local\Temp\tvjkel.exe

        Filesize

        101KB

        MD5

        47f16d991abe4a7ca791e761f473d7d8

        SHA1

        12b35684609eb4b63c989e10cc2edbf099bc777e

        SHA256

        2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

        SHA512

        1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

      • memory/1128-54-0x0000000076961000-0x0000000076963000-memory.dmp

        Filesize

        8KB

      • memory/1292-65-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1292-66-0x0000000000860000-0x0000000000B63000-memory.dmp

        Filesize

        3.0MB

      • memory/1292-67-0x00000000000F0000-0x0000000000100000-memory.dmp

        Filesize

        64KB

      • memory/1388-68-0x00000000043C0000-0x0000000004484000-memory.dmp

        Filesize

        784KB

      • memory/1388-75-0x0000000005E80000-0x0000000005F29000-memory.dmp

        Filesize

        676KB

      • memory/1388-76-0x0000000005E80000-0x0000000005F29000-memory.dmp

        Filesize

        676KB

      • memory/1616-72-0x00000000000D0000-0x00000000000FD000-memory.dmp

        Filesize

        180KB

      • memory/1616-71-0x00000000009C0000-0x00000000009DC000-memory.dmp

        Filesize

        112KB

      • memory/1616-73-0x0000000001F70000-0x0000000002273000-memory.dmp

        Filesize

        3.0MB

      • memory/1616-74-0x0000000000360000-0x00000000003EF000-memory.dmp

        Filesize

        572KB