Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/03/2023, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe
Resource
win10v2004-20230221-en
General
-
Target
e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe
-
Size
251KB
-
MD5
e25796ad27eb0153d8662e37d05ec56b
-
SHA1
47e308112a5b98f8b2d286bb09c4559b6021b3bc
-
SHA256
e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76
-
SHA512
a425eb1df23630def72f07d528ad157b57d0291713e8969f590f5969688e559e9c2a37b2abf78c4ec650ea8d8edaa398d60ad26323c6679b8c7d30cb44ff210c
-
SSDEEP
6144:DYa6T344OhBM8I5Tq7kDaFqPocnRppmMgDN0h0wx/:DYRuhBz4anOa03/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1464 mgcah.exe 652 mgcah.exe -
Loads dropped DLL 6 IoCs
pid Process 1580 e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe 1580 e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe 1464 mgcah.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1464 set thread context of 652 1464 mgcah.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1744 652 WerFault.exe 27 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1464 mgcah.exe 1464 mgcah.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1464 1580 e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe 26 PID 1580 wrote to memory of 1464 1580 e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe 26 PID 1580 wrote to memory of 1464 1580 e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe 26 PID 1580 wrote to memory of 1464 1580 e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe 26 PID 1464 wrote to memory of 652 1464 mgcah.exe 27 PID 1464 wrote to memory of 652 1464 mgcah.exe 27 PID 1464 wrote to memory of 652 1464 mgcah.exe 27 PID 1464 wrote to memory of 652 1464 mgcah.exe 27 PID 1464 wrote to memory of 652 1464 mgcah.exe 27 PID 652 wrote to memory of 1744 652 mgcah.exe 28 PID 652 wrote to memory of 1744 652 mgcah.exe 28 PID 652 wrote to memory of 1744 652 mgcah.exe 28 PID 652 wrote to memory of 1744 652 mgcah.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe"C:\Users\Admin\AppData\Local\Temp\e066fc71749b0a90749d3b8af5b53aa21bab9d43c63cddcb46c9b1f9ae5beb76.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\mgcah.exe"C:\Users\Admin\AppData\Local\Temp\mgcah.exe" C:\Users\Admin\AppData\Local\Temp\nmlbeworo.wp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\mgcah.exe"C:\Users\Admin\AppData\Local\Temp\mgcah.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 364⤵
- Loads dropped DLL
- Program crash
PID:1744
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
5KB
MD50d21fef0892b0f6420ca2e779eea172a
SHA166f233ff2b691ca9f59f94866902f0000f2e9518
SHA256df151fce86ca5123f99488c0575d691b004149e167a3cf181ddfa6e0834b6c79
SHA5126992aaccd778be88fae0ddd69783b74a6997871f04aa1fc420cf670b95107579e9863cc8380b8a440ce141cad3f8fb678c4646346ff5816ab4c988cee464e7dd
-
Filesize
205KB
MD5936f56b919389031bd5d638c9bad07ca
SHA1ab88090f736103d535484be8727fe0fac2c52e08
SHA2568f7ea36e02e2cf059b3c58dac801ce27f58a7d449569f795694aff273438a89c
SHA512fb897b9475ab16d5d5a492b932d8c01ab61466bfa49d83ba4531e424f6c5fd907e857878186415d3dad66a6e50f45b773ab479be23ff7901ebb779343145abaf
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3
-
Filesize
7KB
MD524b418a08bfce8a6faaf67543794a280
SHA1f4474f8b1e37748be7be9053d5bab23eb2bc801a
SHA256c49828c2c6fdbbe1c29221893d31e95cbb75210390259a884f1beb8c2898fd76
SHA512229985bdbcd3dcd411badaec590073754ecd8ff78cc228098c64a1f93979df5f8d42bbc5ab32084a6bde64991a83d9d35f9afd98630a08546b8b89243d25bee3