Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
318s -
max time network
332s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/03/2023, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
Pizza Tower by Igruha.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Pizza Tower by Igruha.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Pizza Tower by Igruha/data.bin
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Pizza Tower by Igruha/data.bin
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Pizza Tower by Igruha/setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Pizza Tower by Igruha/setup.exe
Resource
win10v2004-20230221-en
General
-
Target
Pizza Tower by Igruha/data.bin
-
Size
177.7MB
-
MD5
0501b82ba18979b41bef8120622b1ff1
-
SHA1
1133d643c1bb26b195c20957c60f815d3a1ec514
-
SHA256
d414321c6e8986645376550c1c41faa579baedb7f6722ac53843f52f43f75948
-
SHA512
8a35e02cf1654af5c7defff44dc209fbf69f2b90aafd3774919d46b2d3d072349fc2bc2c5f140205b901d79f674aa0105327d20aed784181b15a0837d0c6c5e6
-
SSDEEP
3145728:Ps6qxsJHCxqY0PeC5BWhaC+zIYVG9ziKv43dlc8SZklFEst+iXC7b:ktxItnBGaCwIB43da8SZklFEq+iO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\bin_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 872 AcroRd32.exe 872 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1808 2036 cmd.exe 29 PID 2036 wrote to memory of 1808 2036 cmd.exe 29 PID 2036 wrote to memory of 1808 2036 cmd.exe 29 PID 1808 wrote to memory of 872 1808 rundll32.exe 30 PID 1808 wrote to memory of 872 1808 rundll32.exe 30 PID 1808 wrote to memory of 872 1808 rundll32.exe 30 PID 1808 wrote to memory of 872 1808 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Pizza Tower by Igruha\data.bin"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Pizza Tower by Igruha\data.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Pizza Tower by Igruha\data.bin"3⤵
- Suspicious use of SetWindowsHookEx
PID:872
-
-