Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
48ffdc6d59de64ee3d66622cc623f53d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
48ffdc6d59de64ee3d66622cc623f53d.exe
Resource
win10v2004-20231215-en
General
-
Target
48ffdc6d59de64ee3d66622cc623f53d.exe
-
Size
308KB
-
MD5
48ffdc6d59de64ee3d66622cc623f53d
-
SHA1
dca41c5f4d2e014161ac4970a8a8d592139d9252
-
SHA256
9d041c12dcd737b4a60f157f72a71b0b786edf0b37371f0fba83d6d98600b524
-
SHA512
8015720bda2a1400240b072b988e8b59a1cd98d430eb3e902fea54806093cec326fba40a49454c4a4a918eff7a420ca0331aef194979f79bee1fbe53ad278ebf
-
SSDEEP
6144:9zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:zDHNam62ZdKmZmuPH
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/1844-2-0x0000000000400000-0x0000000001400000-memory.dmp family_gandcrab behavioral1/memory/1844-4-0x00000000001B0000-0x00000000001C7000-memory.dmp family_gandcrab behavioral1/memory/1844-11-0x0000000000400000-0x0000000001400000-memory.dmp family_gandcrab behavioral1/memory/1844-14-0x00000000001B0000-0x00000000001C7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wuhjyljwphe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\mpnhql.exe\"" 48ffdc6d59de64ee3d66622cc623f53d.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\E: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\G: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\J: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\R: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\U: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\M: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\O: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\P: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\T: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\V: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\Z: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\B: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\L: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\X: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\Y: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\H: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\I: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\K: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\N: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\Q: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\S: 48ffdc6d59de64ee3d66622cc623f53d.exe File opened (read-only) \??\W: 48ffdc6d59de64ee3d66622cc623f53d.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 48ffdc6d59de64ee3d66622cc623f53d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 48ffdc6d59de64ee3d66622cc623f53d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 48ffdc6d59de64ee3d66622cc623f53d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 1844 48ffdc6d59de64ee3d66622cc623f53d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2460 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 28 PID 1844 wrote to memory of 2460 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 28 PID 1844 wrote to memory of 2460 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 28 PID 1844 wrote to memory of 2460 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 28 PID 1844 wrote to memory of 2456 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 30 PID 1844 wrote to memory of 2456 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 30 PID 1844 wrote to memory of 2456 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 30 PID 1844 wrote to memory of 2456 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 30 PID 1844 wrote to memory of 2468 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 32 PID 1844 wrote to memory of 2468 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 32 PID 1844 wrote to memory of 2468 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 32 PID 1844 wrote to memory of 2468 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 32 PID 1844 wrote to memory of 2520 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 34 PID 1844 wrote to memory of 2520 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 34 PID 1844 wrote to memory of 2520 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 34 PID 1844 wrote to memory of 2520 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 34 PID 1844 wrote to memory of 2404 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 36 PID 1844 wrote to memory of 2404 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 36 PID 1844 wrote to memory of 2404 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 36 PID 1844 wrote to memory of 2404 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 36 PID 1844 wrote to memory of 2192 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 38 PID 1844 wrote to memory of 2192 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 38 PID 1844 wrote to memory of 2192 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 38 PID 1844 wrote to memory of 2192 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 38 PID 1844 wrote to memory of 1324 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 40 PID 1844 wrote to memory of 1324 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 40 PID 1844 wrote to memory of 1324 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 40 PID 1844 wrote to memory of 1324 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 40 PID 1844 wrote to memory of 1604 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 44 PID 1844 wrote to memory of 1604 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 44 PID 1844 wrote to memory of 1604 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 44 PID 1844 wrote to memory of 1604 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 44 PID 1844 wrote to memory of 1708 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 46 PID 1844 wrote to memory of 1708 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 46 PID 1844 wrote to memory of 1708 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 46 PID 1844 wrote to memory of 1708 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 46 PID 1844 wrote to memory of 1740 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 48 PID 1844 wrote to memory of 1740 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 48 PID 1844 wrote to memory of 1740 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 48 PID 1844 wrote to memory of 1740 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 48 PID 1844 wrote to memory of 2036 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 50 PID 1844 wrote to memory of 2036 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 50 PID 1844 wrote to memory of 2036 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 50 PID 1844 wrote to memory of 2036 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 50 PID 1844 wrote to memory of 2800 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 52 PID 1844 wrote to memory of 2800 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 52 PID 1844 wrote to memory of 2800 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 52 PID 1844 wrote to memory of 2800 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 52 PID 1844 wrote to memory of 3052 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 54 PID 1844 wrote to memory of 3052 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 54 PID 1844 wrote to memory of 3052 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 54 PID 1844 wrote to memory of 3052 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 54 PID 1844 wrote to memory of 1888 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 56 PID 1844 wrote to memory of 1888 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 56 PID 1844 wrote to memory of 1888 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 56 PID 1844 wrote to memory of 1888 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 56 PID 1844 wrote to memory of 268 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 58 PID 1844 wrote to memory of 268 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 58 PID 1844 wrote to memory of 268 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 58 PID 1844 wrote to memory of 268 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 58 PID 1844 wrote to memory of 952 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 60 PID 1844 wrote to memory of 952 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 60 PID 1844 wrote to memory of 952 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 60 PID 1844 wrote to memory of 952 1844 48ffdc6d59de64ee3d66622cc623f53d.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\48ffdc6d59de64ee3d66622cc623f53d.exe"C:\Users\Admin\AppData\Local\Temp\48ffdc6d59de64ee3d66622cc623f53d.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2460
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2456
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2468
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2404
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1324
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1604
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1708
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1740
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:3052
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1888
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:268
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:952
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2732
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2268
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2892
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:604
-