Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    41s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    19/02/2022, 08:42 UTC

General

  • Target

    0563e8dd01ea8d2cae1c397ccc2b7f631e0e71b901a78cb120b9cbe746a03280.exe

  • Size

    154KB

  • MD5

    85dc3c9daa960c110dabe7d6f1f242e0

  • SHA1

    88b1879ca52863a5acba40e4a895cae96dff2764

  • SHA256

    0563e8dd01ea8d2cae1c397ccc2b7f631e0e71b901a78cb120b9cbe746a03280

  • SHA512

    19f87a621c305a85b2aebe6f09ae39e74fe4f0d7d1ac63aef33d3eb87c6a283c01870b23f69ba41788a95dfd117db6adc9e1ac0def2570b5615cef3b1fc2c6c7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2340
    • C:\Windows\system32\sihost.exe
      sihost.exe
      1⤵
        PID:2304
      • C:\Users\Admin\AppData\Local\Temp\0563e8dd01ea8d2cae1c397ccc2b7f631e0e71b901a78cb120b9cbe746a03280.exe
        "C:\Users\Admin\AppData\Local\Temp\0563e8dd01ea8d2cae1c397ccc2b7f631e0e71b901a78cb120b9cbe746a03280.exe"
        1⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\0563e8dd01ea8d2cae1c397ccc2b7f631e0e71b901a78cb120b9cbe746a03280.exe" /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Windows\system32\reg.exe
            REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\0563e8dd01ea8d2cae1c397ccc2b7f631e0e71b901a78cb120b9cbe746a03280.exe" /f
            3⤵
            • Adds Run key to start application
            PID:3096

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2304-130-0x00007FF6EEDE0000-0x00007FF6EF169000-memory.dmp

        Filesize

        3.5MB

      • memory/2340-131-0x00007FF6EEDE0000-0x00007FF6EF169000-memory.dmp

        Filesize

        3.5MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.