Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
74b64a82f447487a3e86c545ea45d623.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74b64a82f447487a3e86c545ea45d623.exe
Resource
win10v2004-20231222-en
General
-
Target
74b64a82f447487a3e86c545ea45d623.exe
-
Size
1.8MB
-
MD5
74b64a82f447487a3e86c545ea45d623
-
SHA1
0223379f6328524053497962a74f1f64d678dda4
-
SHA256
c624cb7576bd5b2f9e43c254e2c56e34fccd2145f345e0d472da5cc0605655c1
-
SHA512
4d0013aa96101118fb8b4777318bce08db0a83ab5d1d70fac4f8233ae2689a09802ba37eccacb921cbeba6b08aaa48c627362d8545b19ebfbc89ec8a27f05041
-
SSDEEP
24576:AI3VYIiC96Q35g3Z6hEYBOKKqw7gLS8wl2XIYToxEpYWX4+33IQk3:PmIfQf0L1MsToxyrIN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2596 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2060 74b64a82f447487a3e86c545ea45d623.exe 2060 74b64a82f447487a3e86c545ea45d623.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 480 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 74b64a82f447487a3e86c545ea45d623.exe 2060 74b64a82f447487a3e86c545ea45d623.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2596 2060 74b64a82f447487a3e86c545ea45d623.exe 28 PID 2060 wrote to memory of 2596 2060 74b64a82f447487a3e86c545ea45d623.exe 28 PID 2060 wrote to memory of 2596 2060 74b64a82f447487a3e86c545ea45d623.exe 28 PID 2060 wrote to memory of 2596 2060 74b64a82f447487a3e86c545ea45d623.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b64a82f447487a3e86c545ea45d623.exe"C:\Users\Admin\AppData\Local\Temp\74b64a82f447487a3e86c545ea45d623.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\cpuz_driver_2060.log2⤵
- Opens file in notepad (likely ransom note)
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52a36deae727da3718ae831a553971f93
SHA1864e1d742efcf9fd6dc9b01844bf890676cea5f4
SHA25632a13ba3c17520ccd1eaec94b6b121bfb4c7033ffd591d43d8945387f23344a1
SHA5122d313c746f487b02a6d8d8337bde1bc3b904c017d1b8f6aa366232d566589103ea293adeca262268a9363b7517e16b7e798bfa98d2895e51e89276e65d91a521
-
Filesize
1KB
MD562d90ced379a0f2b921a1ee47e2905d2
SHA1cb446ba5e5126dcb2ca00ee98a26e2fe3880e03d
SHA256b3efead2f1b78822f0f49f83cea7c9e2acf689c4f73ba5d324f3a50e4604f410
SHA5122ead96dad435678af3b522f98201cfb99da763518389bf87fbdc4135246c6939d56309cf1d1dfab32399e2c1c055f8e46477ff226c08652d68a140b99e292ac9
-
Filesize
757B
MD5b155abad20117f335f4f2e9b30ece11d
SHA1eb99498860885419c05a2b4aff2b6a539074935a
SHA256d8113032ba8623cda51d15e63f93f20a72105b02ecdf044c7a379d3f5f7095f2
SHA512791cad60fc9a4a108f74b7f37600b558b540c823123234497df0e05f66f063328c6df6d15d70a3a0d3afa26552a7d4a63fd5be3bbe2dcd2d993a51f26307c7cb