Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/04/2023, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe
Resource
win10v2004-20230220-en
General
-
Target
3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe
-
Size
305KB
-
MD5
e9e8c070b34b395489a18bd9cc5cfe97
-
SHA1
5822461d43129b2501ef1e963bd3b4bcc182e40d
-
SHA256
3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2
-
SHA512
44706890d8ad5d74f217f2b245f3ea84434b84082e253d39bba537f61832f94155b2e6be654b3069ae38050a790c7f3c457ecec6b03520f957ac1d1fa21d114e
-
SSDEEP
6144:/Ya6KLv4nsx++b52HokQCkaDsR3XBoQV5KIWanleg/K7rfbiiGi:/Y0LvrJAHI7QYkmnlzS7rAi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Control Panel\International\Geo\Nation wrlzkzy.exe -
Executes dropped EXE 2 IoCs
pid Process 1920 wrlzkzy.exe 2004 wrlzkzy.exe -
Loads dropped DLL 4 IoCs
pid Process 1972 3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe 1972 3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe 1920 wrlzkzy.exe 1704 mstsc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1920 set thread context of 2004 1920 wrlzkzy.exe 30 PID 2004 set thread context of 1248 2004 wrlzkzy.exe 15 PID 1704 set thread context of 1248 1704 mstsc.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-3430344531-3702557399-3004411149-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2004 wrlzkzy.exe 2004 wrlzkzy.exe 2004 wrlzkzy.exe 2004 wrlzkzy.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1920 wrlzkzy.exe 2004 wrlzkzy.exe 2004 wrlzkzy.exe 2004 wrlzkzy.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe 1704 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2004 wrlzkzy.exe Token: SeDebugPrivilege 1704 mstsc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1920 1972 3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe 28 PID 1972 wrote to memory of 1920 1972 3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe 28 PID 1972 wrote to memory of 1920 1972 3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe 28 PID 1972 wrote to memory of 1920 1972 3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe 28 PID 1920 wrote to memory of 2004 1920 wrlzkzy.exe 30 PID 1920 wrote to memory of 2004 1920 wrlzkzy.exe 30 PID 1920 wrote to memory of 2004 1920 wrlzkzy.exe 30 PID 1920 wrote to memory of 2004 1920 wrlzkzy.exe 30 PID 1920 wrote to memory of 2004 1920 wrlzkzy.exe 30 PID 1248 wrote to memory of 1704 1248 Explorer.EXE 33 PID 1248 wrote to memory of 1704 1248 Explorer.EXE 33 PID 1248 wrote to memory of 1704 1248 Explorer.EXE 33 PID 1248 wrote to memory of 1704 1248 Explorer.EXE 33 PID 1704 wrote to memory of 1940 1704 mstsc.exe 36 PID 1704 wrote to memory of 1940 1704 mstsc.exe 36 PID 1704 wrote to memory of 1940 1704 mstsc.exe 36 PID 1704 wrote to memory of 1940 1704 mstsc.exe 36 PID 1704 wrote to memory of 1940 1704 mstsc.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe"C:\Users\Admin\AppData\Local\Temp\3fb2ea468d879582791fb74c6ef0898e45f62b2e22c6b6b1311def934957cde2.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\wrlzkzy.exe"C:\Users\Admin\AppData\Local\Temp\wrlzkzy.exe" C:\Users\Admin\AppData\Local\Temp\irwxzea.nf3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\wrlzkzy.exe"C:\Users\Admin\AppData\Local\Temp\wrlzkzy.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1456
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1144
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD56ae5403c5208ef1be21da0cd8a2a6148
SHA1a7d05f32e8d8cd3328b512715adb49c8a5d89214
SHA2560a6eaf357edafed3b457a7038a9be8b4e323b2d87e12a3414be212a262cd8a21
SHA5124cd00f509fd3d45c7c3c2d8fbb3a38930e204056df6fdc9549fdadedfbe4a3a326e8f89bc28cf891f649ba36c92175f534d019627c4677646ccbf937c24e301d
-
Filesize
205KB
MD5e75bf2acec6e9a536f58ba066ec0e05a
SHA1a1a6b1fcd7e60d1f1a441574d7614f6da2370578
SHA256603420dac511cb1c0a550f6db3b2f49da1d18a258f4f7110dd041ee2be35e4ee
SHA512d7130aff461125c91625ffcf938a039058e5af307ec3891ecad04455dbf897efe1b6880fd86538cd52c34115a84d3d9e164c32768caf3d1c2332390a1cd0a8f3
-
Filesize
440KB
MD55d874a46532117f82095481976117fa1
SHA10a33fdef5084db25e24451dbde80238b487fbe78
SHA256d6ccab1423559c6cf50202bc81a4576f969aa9c275eaaeb9a2ac2c827cd60447
SHA512f0624277f3b4839c836291e1d1eb03cda875ba192243427afa967819b213f0cdade02f22e20b786b4680e4faaef20c045ad0a456d5f85fc04d3ab2e081ff4c61
-
Filesize
147KB
MD56b34e3f7bf37f2269e6f86cae8e24ea1
SHA179b4bcd8bc97c506b3161985e1ba1e94344722af
SHA25616c3749c576220726436bab7a636c6ebe3e40fb7d5856d7570d421fafc4703bd
SHA51293de3e3ba961c81d3c0b47809c740326a0e369c641bb30be818f4780bdfff9c4a727111fe973ffd7c6b18ffd3d02341b96f98f6d72d374d1909156276b13cdf3
-
Filesize
147KB
MD56b34e3f7bf37f2269e6f86cae8e24ea1
SHA179b4bcd8bc97c506b3161985e1ba1e94344722af
SHA25616c3749c576220726436bab7a636c6ebe3e40fb7d5856d7570d421fafc4703bd
SHA51293de3e3ba961c81d3c0b47809c740326a0e369c641bb30be818f4780bdfff9c4a727111fe973ffd7c6b18ffd3d02341b96f98f6d72d374d1909156276b13cdf3
-
Filesize
147KB
MD56b34e3f7bf37f2269e6f86cae8e24ea1
SHA179b4bcd8bc97c506b3161985e1ba1e94344722af
SHA25616c3749c576220726436bab7a636c6ebe3e40fb7d5856d7570d421fafc4703bd
SHA51293de3e3ba961c81d3c0b47809c740326a0e369c641bb30be818f4780bdfff9c4a727111fe973ffd7c6b18ffd3d02341b96f98f6d72d374d1909156276b13cdf3
-
Filesize
147KB
MD56b34e3f7bf37f2269e6f86cae8e24ea1
SHA179b4bcd8bc97c506b3161985e1ba1e94344722af
SHA25616c3749c576220726436bab7a636c6ebe3e40fb7d5856d7570d421fafc4703bd
SHA51293de3e3ba961c81d3c0b47809c740326a0e369c641bb30be818f4780bdfff9c4a727111fe973ffd7c6b18ffd3d02341b96f98f6d72d374d1909156276b13cdf3
-
Filesize
841KB
MD55fc6cd5d5ca1489d2a3c361717359a95
SHA15c630e232cd5761e7a611e41515be4afa3e7a141
SHA25685c8b8a648c56cf5f063912e0e26ecebb90e0caf2f442fd5cdd8287301fe7e81
SHA5125f9124a721f6b463d4f980920e87925098aa753b0fa2a59a3ff48b48d2b1a45d760fd46445414d84fb66321181cd2c82a4194361811114c15e35b42f838ab792
-
Filesize
147KB
MD56b34e3f7bf37f2269e6f86cae8e24ea1
SHA179b4bcd8bc97c506b3161985e1ba1e94344722af
SHA25616c3749c576220726436bab7a636c6ebe3e40fb7d5856d7570d421fafc4703bd
SHA51293de3e3ba961c81d3c0b47809c740326a0e369c641bb30be818f4780bdfff9c4a727111fe973ffd7c6b18ffd3d02341b96f98f6d72d374d1909156276b13cdf3
-
Filesize
147KB
MD56b34e3f7bf37f2269e6f86cae8e24ea1
SHA179b4bcd8bc97c506b3161985e1ba1e94344722af
SHA25616c3749c576220726436bab7a636c6ebe3e40fb7d5856d7570d421fafc4703bd
SHA51293de3e3ba961c81d3c0b47809c740326a0e369c641bb30be818f4780bdfff9c4a727111fe973ffd7c6b18ffd3d02341b96f98f6d72d374d1909156276b13cdf3
-
Filesize
147KB
MD56b34e3f7bf37f2269e6f86cae8e24ea1
SHA179b4bcd8bc97c506b3161985e1ba1e94344722af
SHA25616c3749c576220726436bab7a636c6ebe3e40fb7d5856d7570d421fafc4703bd
SHA51293de3e3ba961c81d3c0b47809c740326a0e369c641bb30be818f4780bdfff9c4a727111fe973ffd7c6b18ffd3d02341b96f98f6d72d374d1909156276b13cdf3