Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
FE06A030.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FE06A030.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
FE06A030.pnach
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
FE06A030.pnach
Resource
win10v2004-20240226-en
General
-
Target
FE06A030.rar
-
Size
440B
-
MD5
7d4f7ce02e95c8ca18fd05c42a0a0588
-
SHA1
8c90d9e2cd55e6c372ebfeec390bd8f6807530e9
-
SHA256
b8e0cf75829325382142e376ab5357a5a206d2f54af8066954cd536b6dff71c6
-
SHA512
f744a34d712f058c807faf85266948288d7516c0026363fc8f955e82303ba1e2ae9c5c04969f13858bfe6993442ae3ee9250abfd10c9077c90a0258a4f4b933e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2780 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2776 7zFM.exe 2776 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2776 7zFM.exe 2768 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2776 7zFM.exe Token: 35 2776 7zFM.exe Token: SeSecurityPrivilege 2776 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2776 7zFM.exe 2776 7zFM.exe 2776 7zFM.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2776 1760 cmd.exe 29 PID 1760 wrote to memory of 2776 1760 cmd.exe 29 PID 1760 wrote to memory of 2776 1760 cmd.exe 29 PID 2776 wrote to memory of 2768 2776 7zFM.exe 30 PID 2776 wrote to memory of 2768 2776 7zFM.exe 30 PID 2776 wrote to memory of 2768 2776 7zFM.exe 30 PID 2768 wrote to memory of 2780 2768 rundll32.exe 31 PID 2768 wrote to memory of 2780 2768 rundll32.exe 31 PID 2768 wrote to memory of 2780 2768 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FE06A030.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FE06A030.rar"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7zO8DA14876\FE06A030.pnach3⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO8DA14876\FE06A030.pnach4⤵
- Opens file in notepad (likely ransom note)
PID:2780
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5dc029fa134626515956d65028b17a13d
SHA1025293456c942cec28b3b1abd8979826a786ef75
SHA25656adaa424c266a229b154d9d21661b4af00d065adab89b83e2aa4fd09c52ec89
SHA512c41ffd2cc335cdc643e98dc72d46afce4a8b4c998328fb5f1dcb5699f80119a889140e47fd5e45411a12b42b8ca97827d0e4cd1bde71e63ad244f9f94d18fac1