Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20/02/2022, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe
Resource
win10v2004-en-20220113
General
-
Target
e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe
-
Size
170KB
-
MD5
b8ebb6a557b474929505f647ebce05d6
-
SHA1
8b45c835225766c631224fb5c49259fcc12d898f
-
SHA256
e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39
-
SHA512
aa9ee807e94763911cccbf456aa98fb230dfd6fc5ab08e5384b5c018478fcfb8063b4632e937a194777104e76deb113508ec44533fe6d122f8d2b3306b7515fa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2832 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 83 PID 1556 wrote to memory of 2832 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 83 PID 1556 wrote to memory of 2356 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 60 PID 2832 wrote to memory of 5052 2832 cmd.exe 85 PID 2832 wrote to memory of 5052 2832 cmd.exe 85 PID 1556 wrote to memory of 2364 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 23 PID 1556 wrote to memory of 2556 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 29 PID 1556 wrote to memory of 2764 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 54 PID 1556 wrote to memory of 3256 1556 e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe 53
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2364
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2556
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2764
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe"C:\Users\Admin\AppData\Local\Temp\e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e99e1b24c8e93ac03721a34f2e2ecfffb11ff247d8a2bdb8c0234e41a122be39.exe" /f3⤵PID:5052
-
-