Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/04/2023, 09:46
230414-lrmgqaag8s 1014/04/2023, 09:39
230414-lm3yxaag6y 1013/04/2023, 06:38
230413-hd2spshh29 10Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/04/2023, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
bin-cr.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bin-cr.exe
Resource
win10v2004-20230220-en
General
-
Target
bin-cr.exe
-
Size
2.1MB
-
MD5
50d9ad764597d6970f0480b58c4cf88e
-
SHA1
72c210f8b80c755a6f5198ca6dea509872dee98a
-
SHA256
57ba6e0a9c0804c9a3d239dc6fb2a6742f3a91b762741772dd3571e1cbec45f8
-
SHA512
6d8bb209d50ec7a2349174255faa33696826d9c31eab7a22c63840afdc8711dd44bf42a35dad58c99f4ed1c057f4adaa913fe7e292afc1bee9482b5d08a02e07
-
SSDEEP
24576:opwU6X5VuMFwg1SkQpRzFabsmVnR/ChijkYHGo5ExFNIprhIw0cNN4CJP6SSTzny:owVuMF5rbNWijJmA0cP42Jr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gykujii = "\"C:\\Users\\Admin\\AppData\\Roaming\\Dfaofq\\Gykujii.exe\"" bin-cr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 836 powershell.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe 1728 bin-cr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 1728 bin-cr.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1728 wrote to memory of 836 1728 bin-cr.exe 28 PID 1728 wrote to memory of 836 1728 bin-cr.exe 28 PID 1728 wrote to memory of 836 1728 bin-cr.exe 28 PID 1728 wrote to memory of 836 1728 bin-cr.exe 28 PID 1728 wrote to memory of 1636 1728 bin-cr.exe 31 PID 1728 wrote to memory of 1636 1728 bin-cr.exe 31 PID 1728 wrote to memory of 1636 1728 bin-cr.exe 31 PID 1728 wrote to memory of 1636 1728 bin-cr.exe 31 PID 1728 wrote to memory of 796 1728 bin-cr.exe 32 PID 1728 wrote to memory of 796 1728 bin-cr.exe 32 PID 1728 wrote to memory of 796 1728 bin-cr.exe 32 PID 1728 wrote to memory of 796 1728 bin-cr.exe 32 PID 1728 wrote to memory of 288 1728 bin-cr.exe 33 PID 1728 wrote to memory of 288 1728 bin-cr.exe 33 PID 1728 wrote to memory of 288 1728 bin-cr.exe 33 PID 1728 wrote to memory of 288 1728 bin-cr.exe 33 PID 1728 wrote to memory of 864 1728 bin-cr.exe 34 PID 1728 wrote to memory of 864 1728 bin-cr.exe 34 PID 1728 wrote to memory of 864 1728 bin-cr.exe 34 PID 1728 wrote to memory of 864 1728 bin-cr.exe 34 PID 1728 wrote to memory of 940 1728 bin-cr.exe 35 PID 1728 wrote to memory of 940 1728 bin-cr.exe 35 PID 1728 wrote to memory of 940 1728 bin-cr.exe 35 PID 1728 wrote to memory of 940 1728 bin-cr.exe 35 PID 1728 wrote to memory of 1640 1728 bin-cr.exe 36 PID 1728 wrote to memory of 1640 1728 bin-cr.exe 36 PID 1728 wrote to memory of 1640 1728 bin-cr.exe 36 PID 1728 wrote to memory of 1640 1728 bin-cr.exe 36 PID 1728 wrote to memory of 1632 1728 bin-cr.exe 37 PID 1728 wrote to memory of 1632 1728 bin-cr.exe 37 PID 1728 wrote to memory of 1632 1728 bin-cr.exe 37 PID 1728 wrote to memory of 1632 1728 bin-cr.exe 37 PID 1728 wrote to memory of 1696 1728 bin-cr.exe 38 PID 1728 wrote to memory of 1696 1728 bin-cr.exe 38 PID 1728 wrote to memory of 1696 1728 bin-cr.exe 38 PID 1728 wrote to memory of 1696 1728 bin-cr.exe 38 PID 1728 wrote to memory of 1820 1728 bin-cr.exe 39 PID 1728 wrote to memory of 1820 1728 bin-cr.exe 39 PID 1728 wrote to memory of 1820 1728 bin-cr.exe 39 PID 1728 wrote to memory of 1820 1728 bin-cr.exe 39 PID 1728 wrote to memory of 588 1728 bin-cr.exe 40 PID 1728 wrote to memory of 588 1728 bin-cr.exe 40 PID 1728 wrote to memory of 588 1728 bin-cr.exe 40 PID 1728 wrote to memory of 588 1728 bin-cr.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exe"C:\Users\Admin\AppData\Local\Temp\bin-cr.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\bin-cr.exeC:\Users\Admin\AppData\Local\Temp\bin-cr.exe2⤵PID:588
-