Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe
Resource
win10v2004-20231222-en
General
-
Target
787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe
-
Size
2.3MB
-
MD5
0636d779e31acaa547ab6c6a8a7b222e
-
SHA1
b26b10fc2017a68d3c1c60aa6b969d52e3a7e53b
-
SHA256
787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5
-
SHA512
150abcceafe9ea4509fc2df7403fc94dcffca698b3dce2a6f8e2b784e34930551e11c4bc092aa7a85f535736ad434215d64bd14ad3b267bf3fd3424b9d6c2053
-
SSDEEP
49152:gy63QQgrb/TCvO90dL3BmAFd4A64nsfJ0+8lGgTl75Cgf8b1a15kOgx:c3Rl+Itv15k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 calc.exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2740 NOTEPAD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2304 787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2264 2304 787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe 29 PID 2304 wrote to memory of 2264 2304 787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe 29 PID 2304 wrote to memory of 2264 2304 787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe 29 PID 2264 wrote to memory of 2740 2264 cmd.exe 31 PID 2264 wrote to memory of 2740 2264 cmd.exe 31 PID 2264 wrote to memory of 2740 2264 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe"C:\Users\Admin\AppData\Local\Temp\787cac04295f81ec2fcc4d02e4c477579caf909d6c7685498408a4cc8101eca5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\cmd.execmd " /c " C:\Users\Admin\AppData\Local\Temp\1.txt2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\1.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2740
-
-
-
C:\Users\Public\Downloads\calc.exe.exe"C:/Users/Public/Downloads/calc.exe.exe "2⤵
- Executes dropped EXE
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6B
MD54297f44b13955235245b2497399d7a93
SHA1601f1889667efaebb33b8c12572835da3f027f78
SHA25696cae35ce8a9b0244178bf28e4966c2ce1b8385723a96a6b838858cdd6ca0a1e
SHA512263fec58861449aacc1c328a4aff64aff4c62df4a2d50b3f207fa89b6e242c9aa778e7a8baeffef85b6ca6d2e7dc16ff0a760d59c13c238f6bcdc32f8ce9cc62
-
Filesize
44KB
MD52f82623f9523c0d167862cad0eff6806
SHA15d77804b87735e66d7d1e263c31c4ef010f16153
SHA2569c2c8a8588fe6db09c09337e78437cb056cd557db1bcf5240112cbfb7b600efb
SHA5127fe8285e52355f2e53650dc4176f62299b8185ed7188850e0a566ddef7e77e1e88511bdcf6f478c938acef3d61d8b269e218970134e1ffc5581f8c7be750c330