Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/04/2024, 06:20 UTC

240407-g37jtaeh8z 10

07/04/2024, 06:20 UTC

240407-g3294aeh8w 10

07/04/2024, 06:20 UTC

240407-g3wsbafd64 10

07/04/2024, 06:19 UTC

240407-g3pzrseh7w 10

25/07/2022, 19:25 UTC

220725-x41ewsbfh9 10

Analysis

  • max time kernel
    1563s
  • max time network
    1567s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/04/2024, 06:20 UTC

General

  • Target

    5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe

  • Size

    1.3MB

  • MD5

    029121f4c1fc507eee2da7ef0f81c52f

  • SHA1

    5bdfc541991da167e6fb256a64e05e05f92fc5db

  • SHA256

    5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1

  • SHA512

    94e38cc00fcbc431da0300eba6683f251e0b4c4ca71cc88d941acf998207d3df14b59322d9d59d5522649c80f26689fa1a44ad59371eeafcd4107c9dd42d3e2f

  • SSDEEP

    24576:GP2e+mt0BUefY1OOz6KgoHPLVGdbiCu4SMZ4QU:89EfG3s28vuWg

Malware Config

Signatures

  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
    "C:\Users\Admin\AppData\Local\Temp\5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe List Shadows
      2⤵
      • Interacts with shadow copies
      PID:1720
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:560
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe List Shadows
      2⤵
      • Interacts with shadow copies
      PID:1912
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:916

Network

    No results found
  • 127.0.0.1:49207
    5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
  • 193.23.244.244:443
    www.3gkcea2f4uup.com
    tls
    5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
    430 B
    132 B
    5
    3
  • 86.59.21.38:443
    www.43wne25ei5d52yfwx52m.com
    tls
    5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
    3.2kB
    6.4kB
    14
    16
  • 171.25.193.9:80
    www.6juyexxb242syxvma2cawz7jr.com
    tls
    5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
    3.7kB
    6.3kB
    15
    13
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\System32\xfs

    Filesize

    85KB

    MD5

    0bb6f8e62c574baa3e5de2b46a95f1a1

    SHA1

    797304b9c8cad6f1685f39c0a0cf0828ec54ac91

    SHA256

    64d8a52a8e6c827b9cec14b9886e1908887035b1c71e679958843e912f91500a

    SHA512

    ee2ac9a94642a71961d9a7aa083a8a537d342b9d3e3c4bd7a6835a15e56fd69c4914d23f779431cc5941597dd606b06af89d3b3d3d72c00cfc1b6fa1e37dda28

  • memory/1444-0-0x00000000002D0000-0x00000000003A5000-memory.dmp

    Filesize

    852KB

  • memory/1444-1-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-2-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-3-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-4-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-5-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-6-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-9-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-11-0x00000000002D0000-0x00000000003A5000-memory.dmp

    Filesize

    852KB

  • memory/1444-12-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-13-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-16-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-37-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-38-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-39-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-40-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-41-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-42-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-43-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-44-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-45-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-46-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-47-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-48-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-49-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-50-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-51-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-53-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-52-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-54-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-55-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-56-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-57-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-58-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-59-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-60-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-61-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-62-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-63-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-64-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-65-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-66-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-67-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-68-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-69-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-70-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-71-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-72-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-73-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-74-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-75-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-76-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-77-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-78-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-79-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-80-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-81-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-82-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-83-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-84-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-85-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-86-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-87-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-88-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-89-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-90-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-91-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

  • memory/1444-92-0x0000000000400000-0x0000000000608000-memory.dmp

    Filesize

    2.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.