Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    23s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26/02/2025, 14:19

General

  • Target

    MimicBuilder.exe

  • Size

    3.2MB

  • MD5

    5960d101c8170b432f93387b96927af7

  • SHA1

    8d7e349c22a11f76fc13e9edc50e25067766ef66

  • SHA256

    f23542f7ee78d204034cb11a48c97b04e447fc17535133414da453fadd4738cb

  • SHA512

    9c7984f8bb374291af37268fb2c5008ac71d64d6fe0e5837c29000d448c81da0fca820d8a74ffeb3b50b0677cbb64c4331ba27fbce4ca42ec65634926ae4e251

  • SSDEEP

    49152:ngwRk5ifu1DBgutBPNl1XIVRGTYAxoLayVwbRp2BQG82XmBTgmrZhhfCYZ:ngwRk5vguPPH1XWGIb4Rp26G844TXn

Malware Config

Signatures

  • Detects Mimic ransomware 1 IoCs
  • Mimic

    Ransomware family was first exploited in the wild in 2022.

  • Mimic family
  • Clears Windows event logs 1 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MimicBuilder.exe
    "C:\Users\Admin\AppData\Local\Temp\MimicBuilder.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p2683527442232016684 Everything64.dll
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2760
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\datadecrypt.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\datadecrypt.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\Datadecrypt.exe
        "C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\Datadecrypt.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\gui40.exe
          C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\gui40.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
        • C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\Everything.exe
          "C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\Everything.exe" -startup
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2700
        • C:\Windows\SysWOW64\wevtutil.exe
          wevtutil.exe cl security
          4⤵
          • Clears Windows event logs
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2492
        • C:\Windows\SysWOW64\wevtutil.exe
          wevtutil.exe cl system
          4⤵
          • Clears Windows event logs
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1164
        • C:\Windows\SysWOW64\wevtutil.exe
          wevtutil.exe cl application
          4⤵
          • Clears Windows event logs
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:856
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\Everything.db

    Filesize

    9.2MB

    MD5

    03626863ea8e70964c30c64044b573c4

    SHA1

    37f94642549c53daad1927ae893a955afc3d810e

    SHA256

    df097037625e93cca24fa47c796d5904df8d4f60f98e3f692b5e4fb9fb51ea85

    SHA512

    a5da98aad03f2d4db439884bd0e54e6dd364a94e3a6603601f9758dba3c26d4fe8003e43a940ce8fbc891d628b535db4edc4104b921f575046cf5bd1c7c9c608

  • C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\Everything.ini

    Filesize

    20KB

    MD5

    67fe18568f0b5132b76b23aeb28f1c9f

    SHA1

    c94eee5a10e091a35fed0471be2df1864f9e0d4f

    SHA256

    8af4f700631164ebe95da18db4d6c0fe24c151e02669f0df78c21292aaf94505

    SHA512

    185a09c17d75edef2a7c487d1d4ca134cc69c8ce30ec78bc5aa12caef5978871bad12f60cdcad6f0d010325f23cd428ffc32bcb7f021e7ee72622f70e83219d0

  • C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\global_options.ini

    Filesize

    8KB

    MD5

    cabb8d121bcb0f8b3471f9fe81c7718d

    SHA1

    b7b5ef9de59cf40f986058e05e7f8971055fbb7e

    SHA256

    9d66907c6b9ec6ec5e61c8f367c3ae05e93037ac576c60162e7329bb78ce496f

    SHA512

    76fac20f7b604d9e35f5ca2fb9e146fe23def51f92b4d488b83633d5e6559357479216ba8d17bc540dcdfda8ed23c468ea33e4f40d515f3d6991aec70d7bc54d

  • C:\Users\Admin\AppData\Local\BC57CE41-27D7-C825-6CB7-A6508B063C81\session.tmp

    Filesize

    32B

    MD5

    78c3aa88f42336f09a309222fe86120b

    SHA1

    53d93ad5a9d906e9bb4079bc93ff62d003a86cd3

    SHA256

    7ee7a4d55f01e7f9950c31707a985b3a1dc6dc727902da642ee6ec57b88b5198

    SHA512

    da1a2d35df7b9b046ae80208c1ca3dc31e21b3e43c31a1f038ebfb07c6126c2a6fb2b50acff9e8fb0b75ee182fa0948382ea5df277884928e96d22cc7257177f

  • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

    Filesize

    196B

    MD5

    32a79aba4eeb9fa9e1693b106367c4ef

    SHA1

    e830778969f69b703f625b085336243730d6c960

    SHA256

    87943f487afe6305652c4205771b0a438290e351cc6cc9b877dc6bbd8fa42c8c

    SHA512

    1a1fbbfd1a4a26e49e5ceaa1909ca7d3e07db879fff54cfa9221e860aa265481dcea7d6221e06c1ffec14364ee5714284e1fb98db8a57ef02160ae19557a4293

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DC.exe

    Filesize

    802KB

    MD5

    ac34ba84a5054cd701efad5dd14645c9

    SHA1

    dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b

    SHA256

    c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e

    SHA512

    df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything.exe

    Filesize

    1.7MB

    MD5

    c44487ce1827ce26ac4699432d15b42a

    SHA1

    8434080fad778057a50607364fee8b481f0feef8

    SHA256

    4c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405

    SHA512

    a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything.ini

    Filesize

    548B

    MD5

    742c2400f2de964d0cce4a8dabadd708

    SHA1

    c452d8d4c3a82af4bc57ca8a76e4407aaf90deca

    SHA256

    2fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01

    SHA512

    63a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything2.ini

    Filesize

    550B

    MD5

    51014c0c06acdd80f9ae4469e7d30a9e

    SHA1

    204e6a57c44242fad874377851b13099dfe60176

    SHA256

    89ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5

    SHA512

    79b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything32.dll

    Filesize

    84KB

    MD5

    3b03324537327811bbbaff4aafa4d75b

    SHA1

    1218bd8165a2e0ec56a88b5a8bb4b27e52b564e7

    SHA256

    8cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880

    SHA512

    ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything64.dll

    Filesize

    2.2MB

    MD5

    6beaabdcebd1819dd160b0137b8d68e0

    SHA1

    354dbc5877c6a24a4b83211b695077e28aaea060

    SHA256

    0da80dffc602b64b17f47a1b82f38f75a2222234d83ffda4131f8ad3ae99682e

    SHA512

    481ef0a44580a713af5f5169fc2ab20ad943dda3b3477e14d4bc92f1131ad6afb629874d0beda72fc3852274f00e3cb4c2c30a6c81bd7d25f89e3f7c29e34a54

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\datadecrypt.exe

    Filesize

    2.4MB

    MD5

    6b81003a9aa0f8925e010211048c1035

    SHA1

    9e229a278a72b13c59331bac4baab7373a59d2e6

    SHA256

    c3c77f6f43c24ce810a71f6a3174c5de6e8be398479e5f8207e94c802890cf7c

    SHA512

    2833dd94fc7146776a7a3e11c8fcd681080762a24f525682228d533b93f3b9ecdc9c665a036d7fb9fef034db29f6e64e92b20c2cff731eaea44701e34c7b7a43

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\global_options.ini

    Filesize

    10B

    MD5

    26f59bb93f02d5a65538981bbc2da9cc

    SHA1

    5e99a311784301637638c02401925a89694f463d

    SHA256

    14f93a82d99cd2bf3da0aba73b162a7bb183eded695cffff47a05c1290d2a2fa

    SHA512

    e48f20a62bb2d5de686a7328a682a84821c83c8c4d836287adffbe464a8b4a0ba8ca728a35438c58f142686047b153c9c3f722c0431db620e3ef3479215b9016

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\gui35.exe

    Filesize

    276KB

    MD5

    03a63c096b9757439264b57e4fdf49d1

    SHA1

    a5007873ce19a398274aec9f61e1f90e9b45cc81

    SHA256

    22ea129b0f57184f30b1771c62a3233ba92e581c1f111b4e8abfa318dc92cc46

    SHA512

    0d656d807572f6be4574024e2bbcf0cbd291fe13a1adeb86a333177ee38db16b06da9a18509e599db0d2cf8206b84f6856a9674dba29a2cbeb844a216cb45ddd

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\gui40.exe

    Filesize

    276KB

    MD5

    57850a4490a6afd1ef682eb93ea45e65

    SHA1

    338d147711c56e8a1e75e64a075e5e2984aa0c05

    SHA256

    31feff32d23728b39ed813c1e7dc5fe6a87dcd4d10aa995446a8c5eb5da58615

    SHA512

    15cf499077e0c8f3421b95e09a18ae5468ae20a7b3a263f01cc8e6d445d54f09ca8a3189ecb40c87d0e6277c99b504424cdd0e35bbe493a1b0849900d21bccf8

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\xdel.exe

    Filesize

    350KB

    MD5

    803df907d936e08fbbd06020c411be93

    SHA1

    4aa4b498ae037a2b0479659374a5c3af5f6b8d97

    SHA256

    e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c

    SHA512

    5b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532

  • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

    Filesize

    772KB

    MD5

    b93eb0a48c91a53bda6a1a074a4b431e

    SHA1

    ac693a14c697b1a8ee80318e260e817b8ee2aa86

    SHA256

    ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142

    SHA512

    732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5

  • memory/1656-96-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/1656-91-0x0000000000640000-0x0000000000694000-memory.dmp

    Filesize

    336KB

  • memory/1656-90-0x0000000000150000-0x0000000000156000-memory.dmp

    Filesize

    24KB

  • memory/1656-89-0x0000000000160000-0x00000000001AE000-memory.dmp

    Filesize

    312KB