Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 18:01
Behavioral task
behavioral1
Sample
6e4c12c9c719b9exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
6e4c12c9c719b9exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
6e4c12c9c719b9exeexeexeex.exe
-
Size
73KB
-
MD5
6e4c12c9c719b96b7e51d79625f1770a
-
SHA1
c3c0bf854d6333c5e6fdbb48b60fda27b8ab1447
-
SHA256
16d99d11e7be47f5796df17a40779084db0ac4db8c4e614710790d32fe1747eb
-
SHA512
1767a013e4d7b15290c2ac4163ede7d6cdd85afa34ffc907801c7aa4ca7da7dfc4c65ac123906fd678c7ca9d54baad85fa2232aa6fa2c659a8428a340d503968
-
SSDEEP
1536:b555555555555pmgSeGDjtQhnwmmB0yXMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rC:8MSjOnrmBPMqqDL2/mr3IdE8we0Avu5h
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 6e4c12c9c719b9exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\glfiofqtmfj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6e4c12c9c719b9exeexeexeex.exe" 6e4c12c9c719b9exeexeexeex.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\L: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\E: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\S: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\U: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\V: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\W: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\Z: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\F: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\O: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\P: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\R: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\N: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\B: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\G: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\H: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\J: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\K: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\M: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\Q: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\A: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\X: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\Y: 6e4c12c9c719b9exeexeexeex.exe File opened (read-only) \??\T: 6e4c12c9c719b9exeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6e4c12c9c719b9exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6e4c12c9c719b9exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 6e4c12c9c719b9exeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3064 6e4c12c9c719b9exeexeexeex.exe 3064 6e4c12c9c719b9exeexeexeex.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2156 3064 6e4c12c9c719b9exeexeexeex.exe 28 PID 3064 wrote to memory of 2156 3064 6e4c12c9c719b9exeexeexeex.exe 28 PID 3064 wrote to memory of 2156 3064 6e4c12c9c719b9exeexeexeex.exe 28 PID 3064 wrote to memory of 2156 3064 6e4c12c9c719b9exeexeexeex.exe 28 PID 3064 wrote to memory of 1124 3064 6e4c12c9c719b9exeexeexeex.exe 30 PID 3064 wrote to memory of 1124 3064 6e4c12c9c719b9exeexeexeex.exe 30 PID 3064 wrote to memory of 1124 3064 6e4c12c9c719b9exeexeexeex.exe 30 PID 3064 wrote to memory of 1124 3064 6e4c12c9c719b9exeexeexeex.exe 30 PID 3064 wrote to memory of 652 3064 6e4c12c9c719b9exeexeexeex.exe 32 PID 3064 wrote to memory of 652 3064 6e4c12c9c719b9exeexeexeex.exe 32 PID 3064 wrote to memory of 652 3064 6e4c12c9c719b9exeexeexeex.exe 32 PID 3064 wrote to memory of 652 3064 6e4c12c9c719b9exeexeexeex.exe 32 PID 3064 wrote to memory of 1792 3064 6e4c12c9c719b9exeexeexeex.exe 34 PID 3064 wrote to memory of 1792 3064 6e4c12c9c719b9exeexeexeex.exe 34 PID 3064 wrote to memory of 1792 3064 6e4c12c9c719b9exeexeexeex.exe 34 PID 3064 wrote to memory of 1792 3064 6e4c12c9c719b9exeexeexeex.exe 34 PID 3064 wrote to memory of 2952 3064 6e4c12c9c719b9exeexeexeex.exe 36 PID 3064 wrote to memory of 2952 3064 6e4c12c9c719b9exeexeexeex.exe 36 PID 3064 wrote to memory of 2952 3064 6e4c12c9c719b9exeexeexeex.exe 36 PID 3064 wrote to memory of 2952 3064 6e4c12c9c719b9exeexeexeex.exe 36 PID 3064 wrote to memory of 2856 3064 6e4c12c9c719b9exeexeexeex.exe 38 PID 3064 wrote to memory of 2856 3064 6e4c12c9c719b9exeexeexeex.exe 38 PID 3064 wrote to memory of 2856 3064 6e4c12c9c719b9exeexeexeex.exe 38 PID 3064 wrote to memory of 2856 3064 6e4c12c9c719b9exeexeexeex.exe 38 PID 3064 wrote to memory of 2872 3064 6e4c12c9c719b9exeexeexeex.exe 40 PID 3064 wrote to memory of 2872 3064 6e4c12c9c719b9exeexeexeex.exe 40 PID 3064 wrote to memory of 2872 3064 6e4c12c9c719b9exeexeexeex.exe 40 PID 3064 wrote to memory of 2872 3064 6e4c12c9c719b9exeexeexeex.exe 40 PID 3064 wrote to memory of 736 3064 6e4c12c9c719b9exeexeexeex.exe 42 PID 3064 wrote to memory of 736 3064 6e4c12c9c719b9exeexeexeex.exe 42 PID 3064 wrote to memory of 736 3064 6e4c12c9c719b9exeexeexeex.exe 42 PID 3064 wrote to memory of 736 3064 6e4c12c9c719b9exeexeexeex.exe 42 PID 3064 wrote to memory of 1176 3064 6e4c12c9c719b9exeexeexeex.exe 44 PID 3064 wrote to memory of 1176 3064 6e4c12c9c719b9exeexeexeex.exe 44 PID 3064 wrote to memory of 1176 3064 6e4c12c9c719b9exeexeexeex.exe 44 PID 3064 wrote to memory of 1176 3064 6e4c12c9c719b9exeexeexeex.exe 44 PID 3064 wrote to memory of 2512 3064 6e4c12c9c719b9exeexeexeex.exe 46 PID 3064 wrote to memory of 2512 3064 6e4c12c9c719b9exeexeexeex.exe 46 PID 3064 wrote to memory of 2512 3064 6e4c12c9c719b9exeexeexeex.exe 46 PID 3064 wrote to memory of 2512 3064 6e4c12c9c719b9exeexeexeex.exe 46 PID 3064 wrote to memory of 2544 3064 6e4c12c9c719b9exeexeexeex.exe 48 PID 3064 wrote to memory of 2544 3064 6e4c12c9c719b9exeexeexeex.exe 48 PID 3064 wrote to memory of 2544 3064 6e4c12c9c719b9exeexeexeex.exe 48 PID 3064 wrote to memory of 2544 3064 6e4c12c9c719b9exeexeexeex.exe 48 PID 3064 wrote to memory of 2832 3064 6e4c12c9c719b9exeexeexeex.exe 50 PID 3064 wrote to memory of 2832 3064 6e4c12c9c719b9exeexeexeex.exe 50 PID 3064 wrote to memory of 2832 3064 6e4c12c9c719b9exeexeexeex.exe 50 PID 3064 wrote to memory of 2832 3064 6e4c12c9c719b9exeexeexeex.exe 50 PID 3064 wrote to memory of 2188 3064 6e4c12c9c719b9exeexeexeex.exe 52 PID 3064 wrote to memory of 2188 3064 6e4c12c9c719b9exeexeexeex.exe 52 PID 3064 wrote to memory of 2188 3064 6e4c12c9c719b9exeexeexeex.exe 52 PID 3064 wrote to memory of 2188 3064 6e4c12c9c719b9exeexeexeex.exe 52 PID 3064 wrote to memory of 2732 3064 6e4c12c9c719b9exeexeexeex.exe 54 PID 3064 wrote to memory of 2732 3064 6e4c12c9c719b9exeexeexeex.exe 54 PID 3064 wrote to memory of 2732 3064 6e4c12c9c719b9exeexeexeex.exe 54 PID 3064 wrote to memory of 2732 3064 6e4c12c9c719b9exeexeexeex.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e4c12c9c719b9exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\6e4c12c9c719b9exeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2156
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1124
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:652
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1792
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2952
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2856
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2872
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1176
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2512
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2832
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2188
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2732
-