Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
3802078969745db373c08aad4c6dfc12.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3802078969745db373c08aad4c6dfc12.exe
Resource
win10v2004-20240226-en
General
-
Target
3802078969745db373c08aad4c6dfc12.exe
-
Size
300KB
-
MD5
3802078969745db373c08aad4c6dfc12
-
SHA1
8767190ced02b19d4d515f3b53ae5537e2296e97
-
SHA256
481ad8f30ca4464b61a7886eb41db0e0e59f5d6fb65389b1e9b18f82f985ed5f
-
SHA512
53ebeadc8d3f418dbdbdf54a180c0307fab650b2e5bf8de341a80fd8ac11344f577666e09f80a245c655d591dfc46d946b21baf7b45f1ab1928fb1d2489e38b3
-
SSDEEP
6144:ovEANMO1UnseVgkV0xwvfxnhLTiusLe1740B:nuM0Unsna5mut40B
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/2536-1-0x0000000000400000-0x0000000003B9B000-memory.dmp family_gandcrab behavioral1/memory/2536-3-0x0000000000240000-0x0000000000257000-memory.dmp family_gandcrab behavioral1/memory/2536-10-0x0000000000400000-0x0000000003B9B000-memory.dmp family_gandcrab behavioral1/memory/2536-13-0x0000000000240000-0x0000000000257000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\phteqzguuzh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\grhzaj.exe\"" 3802078969745db373c08aad4c6dfc12.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\A: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\U: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\S: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\Z: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\H: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\I: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\M: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\N: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\O: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\T: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\X: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\Y: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\E: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\J: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\K: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\L: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\P: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\Q: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\R: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\W: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\B: 3802078969745db373c08aad4c6dfc12.exe File opened (read-only) \??\G: 3802078969745db373c08aad4c6dfc12.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3802078969745db373c08aad4c6dfc12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3802078969745db373c08aad4c6dfc12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 3802078969745db373c08aad4c6dfc12.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
pid Process 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe 2536 3802078969745db373c08aad4c6dfc12.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2540 2536 3802078969745db373c08aad4c6dfc12.exe 27 PID 2536 wrote to memory of 2540 2536 3802078969745db373c08aad4c6dfc12.exe 27 PID 2536 wrote to memory of 2540 2536 3802078969745db373c08aad4c6dfc12.exe 27 PID 2536 wrote to memory of 2540 2536 3802078969745db373c08aad4c6dfc12.exe 27 PID 2536 wrote to memory of 2468 2536 3802078969745db373c08aad4c6dfc12.exe 30 PID 2536 wrote to memory of 2468 2536 3802078969745db373c08aad4c6dfc12.exe 30 PID 2536 wrote to memory of 2468 2536 3802078969745db373c08aad4c6dfc12.exe 30 PID 2536 wrote to memory of 2468 2536 3802078969745db373c08aad4c6dfc12.exe 30 PID 2536 wrote to memory of 268 2536 3802078969745db373c08aad4c6dfc12.exe 33 PID 2536 wrote to memory of 268 2536 3802078969745db373c08aad4c6dfc12.exe 33 PID 2536 wrote to memory of 268 2536 3802078969745db373c08aad4c6dfc12.exe 33 PID 2536 wrote to memory of 268 2536 3802078969745db373c08aad4c6dfc12.exe 33 PID 2536 wrote to memory of 2788 2536 3802078969745db373c08aad4c6dfc12.exe 35 PID 2536 wrote to memory of 2788 2536 3802078969745db373c08aad4c6dfc12.exe 35 PID 2536 wrote to memory of 2788 2536 3802078969745db373c08aad4c6dfc12.exe 35 PID 2536 wrote to memory of 2788 2536 3802078969745db373c08aad4c6dfc12.exe 35 PID 2536 wrote to memory of 2832 2536 3802078969745db373c08aad4c6dfc12.exe 37 PID 2536 wrote to memory of 2832 2536 3802078969745db373c08aad4c6dfc12.exe 37 PID 2536 wrote to memory of 2832 2536 3802078969745db373c08aad4c6dfc12.exe 37 PID 2536 wrote to memory of 2832 2536 3802078969745db373c08aad4c6dfc12.exe 37 PID 2536 wrote to memory of 612 2536 3802078969745db373c08aad4c6dfc12.exe 39 PID 2536 wrote to memory of 612 2536 3802078969745db373c08aad4c6dfc12.exe 39 PID 2536 wrote to memory of 612 2536 3802078969745db373c08aad4c6dfc12.exe 39 PID 2536 wrote to memory of 612 2536 3802078969745db373c08aad4c6dfc12.exe 39 PID 2536 wrote to memory of 1732 2536 3802078969745db373c08aad4c6dfc12.exe 41 PID 2536 wrote to memory of 1732 2536 3802078969745db373c08aad4c6dfc12.exe 41 PID 2536 wrote to memory of 1732 2536 3802078969745db373c08aad4c6dfc12.exe 41 PID 2536 wrote to memory of 1732 2536 3802078969745db373c08aad4c6dfc12.exe 41 PID 2536 wrote to memory of 2136 2536 3802078969745db373c08aad4c6dfc12.exe 43 PID 2536 wrote to memory of 2136 2536 3802078969745db373c08aad4c6dfc12.exe 43 PID 2536 wrote to memory of 2136 2536 3802078969745db373c08aad4c6dfc12.exe 43 PID 2536 wrote to memory of 2136 2536 3802078969745db373c08aad4c6dfc12.exe 43 PID 2536 wrote to memory of 2384 2536 3802078969745db373c08aad4c6dfc12.exe 45 PID 2536 wrote to memory of 2384 2536 3802078969745db373c08aad4c6dfc12.exe 45 PID 2536 wrote to memory of 2384 2536 3802078969745db373c08aad4c6dfc12.exe 45 PID 2536 wrote to memory of 2384 2536 3802078969745db373c08aad4c6dfc12.exe 45 PID 2536 wrote to memory of 1868 2536 3802078969745db373c08aad4c6dfc12.exe 47 PID 2536 wrote to memory of 1868 2536 3802078969745db373c08aad4c6dfc12.exe 47 PID 2536 wrote to memory of 1868 2536 3802078969745db373c08aad4c6dfc12.exe 47 PID 2536 wrote to memory of 1868 2536 3802078969745db373c08aad4c6dfc12.exe 47 PID 2536 wrote to memory of 944 2536 3802078969745db373c08aad4c6dfc12.exe 49 PID 2536 wrote to memory of 944 2536 3802078969745db373c08aad4c6dfc12.exe 49 PID 2536 wrote to memory of 944 2536 3802078969745db373c08aad4c6dfc12.exe 49 PID 2536 wrote to memory of 944 2536 3802078969745db373c08aad4c6dfc12.exe 49 PID 2536 wrote to memory of 2492 2536 3802078969745db373c08aad4c6dfc12.exe 51 PID 2536 wrote to memory of 2492 2536 3802078969745db373c08aad4c6dfc12.exe 51 PID 2536 wrote to memory of 2492 2536 3802078969745db373c08aad4c6dfc12.exe 51 PID 2536 wrote to memory of 2492 2536 3802078969745db373c08aad4c6dfc12.exe 51 PID 2536 wrote to memory of 2292 2536 3802078969745db373c08aad4c6dfc12.exe 53 PID 2536 wrote to memory of 2292 2536 3802078969745db373c08aad4c6dfc12.exe 53 PID 2536 wrote to memory of 2292 2536 3802078969745db373c08aad4c6dfc12.exe 53 PID 2536 wrote to memory of 2292 2536 3802078969745db373c08aad4c6dfc12.exe 53 PID 2536 wrote to memory of 3024 2536 3802078969745db373c08aad4c6dfc12.exe 55 PID 2536 wrote to memory of 3024 2536 3802078969745db373c08aad4c6dfc12.exe 55 PID 2536 wrote to memory of 3024 2536 3802078969745db373c08aad4c6dfc12.exe 55 PID 2536 wrote to memory of 3024 2536 3802078969745db373c08aad4c6dfc12.exe 55 PID 2536 wrote to memory of 2360 2536 3802078969745db373c08aad4c6dfc12.exe 57 PID 2536 wrote to memory of 2360 2536 3802078969745db373c08aad4c6dfc12.exe 57 PID 2536 wrote to memory of 2360 2536 3802078969745db373c08aad4c6dfc12.exe 57 PID 2536 wrote to memory of 2360 2536 3802078969745db373c08aad4c6dfc12.exe 57 PID 2536 wrote to memory of 1108 2536 3802078969745db373c08aad4c6dfc12.exe 59 PID 2536 wrote to memory of 1108 2536 3802078969745db373c08aad4c6dfc12.exe 59 PID 2536 wrote to memory of 1108 2536 3802078969745db373c08aad4c6dfc12.exe 59 PID 2536 wrote to memory of 1108 2536 3802078969745db373c08aad4c6dfc12.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\3802078969745db373c08aad4c6dfc12.exe"C:\Users\Admin\AppData\Local\Temp\3802078969745db373c08aad4c6dfc12.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookAW
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2540
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2468
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:268
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2788
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2832
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:612
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1732
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2384
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1868
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:944
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2492
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2292
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:3024
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2360
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1108
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:400
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1132
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2888
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:900
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1616
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2232
-