Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/03/2023, 19:13
230313-xw2yrabf92 3Analysis
-
max time kernel
32s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2023, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
EA DLC Unlocker v2.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
EA DLC Unlocker v2.7z
Resource
win10v2004-20230220-en
General
-
Target
EA DLC Unlocker v2.7z
-
Size
175KB
-
MD5
2c628cca730d954ab017d56992c5afdf
-
SHA1
4686d228df5031e36cd3db6b76571f19f0e6781a
-
SHA256
d1f79e21431b19c736e73266c8587148c1e39a4ecb54217e37f0cd71bc0a480a
-
SHA512
6928095f2cadbb116c0aad92f92579a567c73fdc2f2e3610b5a1e59a3be9e5bd1fe473db1889c3b33b6806ef748b730f675025087a2623190156012d211581ec
-
SSDEEP
3072:N0vQo3WMWZSyIao6YjIRvlSryN1HRGQmTyLVWPv/Gcs+K+8Iq94zIYtSBT0vglN6:N0vQuPWQyIaoh8lSryUQAyQls+kYtDga
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1176 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1792 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1792 AUDIODG.EXE Token: 33 1792 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1792 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1176 1100 cmd.exe 28 PID 1100 wrote to memory of 1176 1100 cmd.exe 28 PID 1100 wrote to memory of 1176 1100 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\EA DLC Unlocker v2.7z"1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\EA DLC Unlocker v2.7z2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1176
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:760
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x43c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792