Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 09:53

General

  • Target

    96dfcbc0a357630ce67db6083cf5bf3d.exe

  • Size

    6.3MB

  • MD5

    96dfcbc0a357630ce67db6083cf5bf3d

  • SHA1

    e5c9b296e5d09e340f394a7ad751b7a71368823d

  • SHA256

    345efb6e2d178dc9c57c9959d005a1f709340cc1e00a80960483ffbca6c4954d

  • SHA512

    ac3a99dd49796883eccae155bda30c28dbdc0b4c637b6cbf0a99c23cd68d9112a687b65b494305e3327038f852bc9e4de4a9025974f183e9522b12d007d7b016

  • SSDEEP

    49152:NEs1qB8NIMI8Sfpwotkzaxc1OGz8iB8NIMI8Sfpwotkzaxc1OGz8j:NE2HIMzKpXOMGQvIMzKpXOMGQj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96dfcbc0a357630ce67db6083cf5bf3d.exe
    "C:\Users\Admin\AppData\Local\Temp\96dfcbc0a357630ce67db6083cf5bf3d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.exe

    Filesize

    6.3MB

    MD5

    1576187693f306c8b6eb9fc34528df2c

    SHA1

    a41de0140d258bb8119cc1c896f627d24f2da52a

    SHA256

    efadb1d3f63b4705639e81f5cb404a82a8bc4aa842cdd3e183bc0577350765d0

    SHA512

    039fb8d73dc2b876305d88f0288a7eebbc99e9e0fc48e01e11381f03cdaa649d65df49375428969259e6e70a7e501aaa113fc120e224364af4f2045339a71930

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    7b3b6fded0f49c8cca12fec7a9eac905

    SHA1

    11ca152c021673d3e500775c0c57d774b176da69

    SHA256

    17e73ca0ab415b7dcf214a7d9f85498a56527851aec297dbdb61ff8ed7b14a15

    SHA512

    fac7a01b25c06fc37549818bb2b10109944c63c964b6f982dd391893106f251bca4b1e7e4b9e52b56f922d449c56ad520de615f29269e8b19b68d0a0da450949

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    954B

    MD5

    3ccb9b73c5f35d3cbad3333ea8c6d42b

    SHA1

    95a59d4b6b1e00171d1d74a9cd7b6026cb383478

    SHA256

    8b01c8b0c5394e6ec1f77e18aa9b526f425299b1deb529cf0393057b4d7da527

    SHA512

    a94ae905cb7c1c8c898225a7c315f7c8b23ea7a10b514e1caef6effcf9e85cc0666d6313097b7992f3eb3b7825cdd2dc9d09c36b21b0a62595fda9f0f2f30b8f

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    864KB

    MD5

    032f241650743ccb6f60bbe3e79b0a4d

    SHA1

    02e92b2e0ef8239e330c7db7f1d628b45f06b648

    SHA256

    afd7fd746c3aa9fb48d2b7ed99f7709a46a419576488ab6d31d1982996fb667e

    SHA512

    1e72fb11a0dfe95c70cc2e3b2987f13254be710348d533a523df9aae37cf9a414ef5755fd8e8c0d19fcd0eaefbf0fe5065053de80e29f6f15ef0dd214d0dac13

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    1.3MB

    MD5

    5b84271bd7b7e1b34d07e7db4b786c32

    SHA1

    d1ed30993c4670f98e372dbbc607e242a2bce452

    SHA256

    66a47c1e844273dbd5447cc85189ad1d1c865029eb50587c92e61dc1d38c25df

    SHA512

    970bcc9c410cc7b0481536befabc2c2f92986cfcac59c7b9002edc31d673df96943f4419ff244af53d30c33edda6b14a7231d352b4349cc818bba9069754817d

  • C:\Windows\SysWOW64\HelpMe.exe

    Filesize

    1.3MB

    MD5

    6338d7d20b6605173ffc2cbac7e3fe98

    SHA1

    e0017a73621ebd7d12475e11d202a0fb8b200507

    SHA256

    4d994d4ef5a05116a97d948ecc8673118a530f6744a11fe2fec8c5aa7b67fa38

    SHA512

    363a144be57873336ea2f7fdb7ba1eeb4f8b6f1b727918b2e078db8e62be32366d912a4047a18d3550d2797685d6c4440ea64fdc9ab2c1fbbb244a2172434881

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    6.3MB

    MD5

    96dfcbc0a357630ce67db6083cf5bf3d

    SHA1

    e5c9b296e5d09e340f394a7ad751b7a71368823d

    SHA256

    345efb6e2d178dc9c57c9959d005a1f709340cc1e00a80960483ffbca6c4954d

    SHA512

    ac3a99dd49796883eccae155bda30c28dbdc0b4c637b6cbf0a99c23cd68d9112a687b65b494305e3327038f852bc9e4de4a9025974f183e9522b12d007d7b016

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    2.1MB

    MD5

    e248db26f49ab5dd99c8547deec49239

    SHA1

    598e32cdc2713bab0af90b11a727725434eedf0b

    SHA256

    b036b5264474d878115c5c22f1d98d53cf7eda8eee76b6422f7db1c507ba6038

    SHA512

    01f563019af211bb987023bb4ac196ae1e8903bdd422f5bd78d7d6819152c4ae650dcf3fdcab71e010bc24d9384dfd27e7170d67ac6e273ef311aa4842fb9dd8

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    1.2MB

    MD5

    0d6d051daa88dd1921344650d4657de3

    SHA1

    12ec0622125a08f94702ac6717c42ebf7c9bf69f

    SHA256

    82b020c61d1117452f66bec2c0c2e5ccb40e3f9777e4b15f0005ebf6b9dfed2f

    SHA512

    ab4baacc1efd0fa40728a655d58454c834eefac726d67183d7a766134b8fc6a1aa33c050da13414cd8deb506d209ecc6a124ed43b560966f70934eabd417ac19

  • memory/1884-0-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/1884-4-0x0000000001C20000-0x0000000001C9C000-memory.dmp

    Filesize

    496KB

  • memory/1884-231-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/1884-1-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1884-236-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1884-237-0x0000000001C20000-0x0000000001C9C000-memory.dmp

    Filesize

    496KB

  • memory/1884-243-0x0000000001C20000-0x0000000001C9C000-memory.dmp

    Filesize

    496KB

  • memory/2728-13-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2728-11-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2728-238-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB