Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 14:56 UTC

240417-sbg1madb74 10

17/04/2024, 14:56 UTC

240417-sbaljsdb64 10

17/04/2024, 14:56 UTC

240417-sbaasadb62 10

17/04/2024, 14:56 UTC

240417-sa9n9aef2v 10

17/04/2024, 14:56 UTC

240417-sa9dgsdb59 10

06/04/2024, 14:44 UTC

240406-r4b5eadc29 10

06/04/2024, 14:43 UTC

240406-r3xpqadb95 10

06/04/2024, 14:42 UTC

240406-r29b5ace9x 10

06/04/2024, 14:41 UTC

240406-r2spdace8x 10

Analysis

  • max time kernel
    1566s
  • max time network
    1567s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/04/2024, 14:44 UTC

General

  • Target

    01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe

  • Size

    1.1MB

  • MD5

    1fc2e4c5ff5844410fc7b78c6987cddf

  • SHA1

    52f676fcbfda7f0929385da963df25eb4638d4a4

  • SHA256

    01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38

  • SHA512

    31efba9acfe4b4bfab315a8d2d15b1b7a5ef83f26fc5de17ec37044bb6b61269f291ddb9e20ad90f2e91fff5221360b34bcf1e36e447d369e0d5333de42681fe

  • SSDEEP

    24576:fDbt4YcxdNDjJQqRTE0cZLx4bcWS5PcQV3D14EAKXtRutF3dFJt8:f1yDNXS2T+4c9cQVxnXtIr3f8

Malware Config

Signatures

  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe
    "C:\Users\Admin\AppData\Local\Temp\01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe List Shadows
      2⤵
      • Interacts with shadow copies
      PID:2004
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:1616
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe List Shadows
      2⤵
      • Interacts with shadow copies
      PID:832
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1660

Network

    No results found
  • 193.23.244.244:443
    www.sxckwjxhwdiymliuch27o.com
    tls
    01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe
    491 B
    132 B
    6
    3
  • 127.0.0.1:49196
    01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe
  • 208.83.223.34:80
    01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe
    152 B
    3
  • 171.25.193.9:80
    www.3taw3o.com
    tls
    01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe
    3.2kB
    7.4kB
    15
    13
  • 131.188.40.189:443
    www.qbw4cc.com
    tls
    01b654c15c38a907d9966a5c1515fa201472ef1e3b831062d283e6cec2763e38.exe
    3.1kB
    6.4kB
    14
    14
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\System32\xfs

    Filesize

    96KB

    MD5

    e11aa0fe6dd8e5347e3e965e850b2434

    SHA1

    69d35f2f672883ed953bd8dad4c362f06664ee3c

    SHA256

    69d007d815d782ca44632ab013078b4eeda7cdb3e1becdfe769ab93d0d045455

    SHA512

    565b51ec45765b49eb7bdda0d303ee4e8521b8cd087a5c83b66579e86fb75cacdc68e02cfabd5cdb44ff65e82caa751dd5818a750eb773a3ab52d9b53a12c86c

  • memory/112-0-0x0000000000220000-0x00000000002F5000-memory.dmp

    Filesize

    852KB

  • memory/112-1-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-2-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-3-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-4-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-5-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-6-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-7-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-11-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-12-0x0000000000220000-0x00000000002F5000-memory.dmp

    Filesize

    852KB

  • memory/112-13-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-16-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-38-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-37-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-39-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-42-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-44-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-45-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-46-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-48-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-47-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-49-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-50-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-51-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-52-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-53-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-54-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-55-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-56-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-57-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-58-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-62-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-63-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-64-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-65-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-66-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-67-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-68-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-69-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-70-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-71-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-72-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-73-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-74-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-75-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-76-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-77-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-78-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-79-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-80-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-81-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-82-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-83-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-84-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-86-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-85-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-87-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-88-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-89-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-90-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-91-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-92-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-93-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-94-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-95-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-96-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-97-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/112-98-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.