Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 08:08

General

  • Target

    672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe

  • Size

    676KB

  • MD5

    2ab765da96e5e7d082f3cd11be081654

  • SHA1

    897f7919c3577a95dbd3d7ba0633f87cdf0ba4f5

  • SHA256

    672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9

  • SHA512

    f892d367ed546c948001ba0a214011b13faa35b2ab11f09ae4ea02c4d0be31025201524a38ea56ab3f249a517b49edf3dffef6899bbfd33eab12aa3845dd2d03

  • SSDEEP

    6144:z5+wzHywOv9sn4OwB7p+S+Wo89UNS8VuiIWUlhxcGsZ0yO1g/rTDAsldDapA3qkq:z5+wjsyn4OwF0S3ninUXgA1OrHNl0n

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
    "C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c format c: /q /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Windows\SysWOW64\format.com
        format c: /q /y
        3⤵
          PID:3784
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c format e: /q /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Windows\SysWOW64\format.com
          format e: /q /y
          3⤵
          • Enumerates connected drives
          PID:4064
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c format g: /q /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Windows\SysWOW64\format.com
          format g: /q /y
          3⤵
          • Enumerates connected drives
          PID:556
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c format f: /q /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Windows\SysWOW64\format.com
          format f: /q /y
          3⤵
          • Enumerates connected drives
          PID:1964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c format d: /q /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3992
        • C:\Windows\SysWOW64\format.com
          format d: /q /y
          3⤵
          • Enumerates connected drives
          PID:4848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads