Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/02/2023, 08:23

230216-kacqhsgf66 7

14/02/2023, 13:14

230214-qg2acach6z 7

14/02/2023, 13:10

230214-qetsgsde72 7

Analysis

  • max time kernel
    128s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 13:10

General

  • Target

    67cf719a695ae1b769da9253901c26d8.exe

  • Size

    5.1MB

  • MD5

    67cf719a695ae1b769da9253901c26d8

  • SHA1

    c148e7823e4bd98060f1b1d402aed070f99b5902

  • SHA256

    296becf74a7989ff8f63a1c572b8b01ff0a7e8472d4d59f31bf9167ed195b2f6

  • SHA512

    52a82db982f67f78558933c2ea5d2df8a88a20fdbedd71fcb0cd367b7c88b91a5388aec1bf5f305b1a0e8c610d489c93149599ee0fe3136d201e2522d50a5a48

  • SSDEEP

    98304:MspkzuYnHDsB7V7UsE/8EI79WFynJih6/BG:M2Su7VSk7wQJc60

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67cf719a695ae1b769da9253901c26d8.exe
    "C:\Users\Admin\AppData\Local\Temp\67cf719a695ae1b769da9253901c26d8.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://bbs.360.cn/thread-15667307-1-1.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://bbs.360.cn/thread-15667307-1-1.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa6d309f405230e7a6831b1b040c662a

    SHA1

    c309d063de6a1d02a8b5585a4338b688ce577d8c

    SHA256

    ba665b2ba821a36dea9720ad5856c1ac0ee5e5ae607c2fce7f01aee7e46dd652

    SHA512

    ece8a5cd7aeb2b786fd34f522ad74fdd569405ec7d1742b898f26b9fe869d38924a0715181639a61e418eec6473d0476979a3d1becb06f7081e4cfe0d8408314

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    9KB

    MD5

    d4d4f0d4f9639ddd297484b9184c0cbf

    SHA1

    2861ade3e9bca536e082c23cf822f392a4dfc024

    SHA256

    5b9b50d06adf70ce8a5ec5fac22e4f845dadc4bdfc332cfa373baeb89a8d1e82

    SHA512

    273e12b72e4f2268f4a8a70b8f02754dd576df5a53650d7e36e7480e5bb6d5466e0cbf0f2c8e58cd70d265309249c742a5de2aa90494be126efb377458f0285d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8Y7SR4JA.txt

    Filesize

    604B

    MD5

    8eeee751ee31dd672bccc38f6c54c471

    SHA1

    4d63d7879d5875b0cb5f144bf85755219114576f

    SHA256

    4a8e4c847112b36d4ad4c110fa1668d454250d6e4924890de9782c8364193843

    SHA512

    a6dd57419393c15d7bd35425dbce2a0a14537d80e6311fecb98e5488470c8e0ac5d2f55a7dbdb5aeb4cb6f839f74ca072dc7c9c9e81e392d21095b5bd5f07828

  • memory/840-54-0x0000000075A91000-0x0000000075A93000-memory.dmp

    Filesize

    8KB

  • memory/840-55-0x0000000000400000-0x0000000000B20000-memory.dmp

    Filesize

    7.1MB

  • memory/840-56-0x0000000000F10000-0x0000000000F20000-memory.dmp

    Filesize

    64KB

  • memory/840-57-0x0000000000400000-0x0000000000B20000-memory.dmp

    Filesize

    7.1MB

  • memory/840-58-0x0000000000F10000-0x0000000000F1D000-memory.dmp

    Filesize

    52KB