Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/01/2025, 06:33
250114-hbk26s1rem 1014/01/2025, 06:12
250114-gyapaa1mfq 1019/06/2022, 16:53
220619-vdyr9sfcgl 10Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19/06/2022, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
AmongusHack.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
AmongusHack.exe
Resource
win10v2004-20220414-en
General
-
Target
AmongusHack.exe
-
Size
202KB
-
MD5
5c39bb532bd116ae2c9e47528c9f81f3
-
SHA1
4af704758e4d281997df43811fcd759e4b3ea755
-
SHA256
09eeb778d2b787fb4a329923ce022d54c8b980213698d74487913700e40b5f1e
-
SHA512
18cd104f1d9ec1c6b52f0461d9cbba4483bad21074805e0e8c425045d77e439e795b19953964abc791f7b17dc7247d4481c2e4e6083019e8e5b4ca704682d320
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 25 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation AmongusHack.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4184 4572 AmongusHack.exe 83 PID 4572 wrote to memory of 4184 4572 AmongusHack.exe 83 PID 4572 wrote to memory of 4184 4572 AmongusHack.exe 83 PID 4184 wrote to memory of 3684 4184 AmongusHack.exe 87 PID 4184 wrote to memory of 3684 4184 AmongusHack.exe 87 PID 4184 wrote to memory of 3684 4184 AmongusHack.exe 87 PID 3684 wrote to memory of 3508 3684 AmongusHack.exe 88 PID 3684 wrote to memory of 3508 3684 AmongusHack.exe 88 PID 3684 wrote to memory of 3508 3684 AmongusHack.exe 88 PID 3508 wrote to memory of 216 3508 AmongusHack.exe 89 PID 3508 wrote to memory of 216 3508 AmongusHack.exe 89 PID 3508 wrote to memory of 216 3508 AmongusHack.exe 89 PID 216 wrote to memory of 3756 216 AmongusHack.exe 91 PID 216 wrote to memory of 3756 216 AmongusHack.exe 91 PID 216 wrote to memory of 3756 216 AmongusHack.exe 91 PID 3756 wrote to memory of 4236 3756 AmongusHack.exe 92 PID 3756 wrote to memory of 4236 3756 AmongusHack.exe 92 PID 3756 wrote to memory of 4236 3756 AmongusHack.exe 92 PID 4236 wrote to memory of 2644 4236 AmongusHack.exe 93 PID 4236 wrote to memory of 2644 4236 AmongusHack.exe 93 PID 4236 wrote to memory of 2644 4236 AmongusHack.exe 93 PID 2644 wrote to memory of 4240 2644 AmongusHack.exe 94 PID 2644 wrote to memory of 4240 2644 AmongusHack.exe 94 PID 2644 wrote to memory of 4240 2644 AmongusHack.exe 94 PID 4240 wrote to memory of 1716 4240 AmongusHack.exe 95 PID 4240 wrote to memory of 1716 4240 AmongusHack.exe 95 PID 4240 wrote to memory of 1716 4240 AmongusHack.exe 95 PID 1716 wrote to memory of 2660 1716 AmongusHack.exe 96 PID 1716 wrote to memory of 2660 1716 AmongusHack.exe 96 PID 1716 wrote to memory of 2660 1716 AmongusHack.exe 96 PID 2660 wrote to memory of 2216 2660 AmongusHack.exe 97 PID 2660 wrote to memory of 2216 2660 AmongusHack.exe 97 PID 2660 wrote to memory of 2216 2660 AmongusHack.exe 97 PID 2216 wrote to memory of 1272 2216 AmongusHack.exe 98 PID 2216 wrote to memory of 1272 2216 AmongusHack.exe 98 PID 2216 wrote to memory of 1272 2216 AmongusHack.exe 98 PID 1272 wrote to memory of 2164 1272 AmongusHack.exe 99 PID 1272 wrote to memory of 2164 1272 AmongusHack.exe 99 PID 1272 wrote to memory of 2164 1272 AmongusHack.exe 99 PID 2164 wrote to memory of 4016 2164 AmongusHack.exe 100 PID 2164 wrote to memory of 4016 2164 AmongusHack.exe 100 PID 2164 wrote to memory of 4016 2164 AmongusHack.exe 100 PID 4016 wrote to memory of 3020 4016 AmongusHack.exe 101 PID 4016 wrote to memory of 3020 4016 AmongusHack.exe 101 PID 4016 wrote to memory of 3020 4016 AmongusHack.exe 101 PID 3020 wrote to memory of 3500 3020 AmongusHack.exe 102 PID 3020 wrote to memory of 3500 3020 AmongusHack.exe 102 PID 3020 wrote to memory of 3500 3020 AmongusHack.exe 102 PID 3500 wrote to memory of 3044 3500 AmongusHack.exe 103 PID 3500 wrote to memory of 3044 3500 AmongusHack.exe 103 PID 3500 wrote to memory of 3044 3500 AmongusHack.exe 103 PID 3044 wrote to memory of 3156 3044 AmongusHack.exe 104 PID 3044 wrote to memory of 3156 3044 AmongusHack.exe 104 PID 3044 wrote to memory of 3156 3044 AmongusHack.exe 104 PID 3156 wrote to memory of 4992 3156 AmongusHack.exe 105 PID 3156 wrote to memory of 4992 3156 AmongusHack.exe 105 PID 3156 wrote to memory of 4992 3156 AmongusHack.exe 105 PID 4992 wrote to memory of 424 4992 AmongusHack.exe 106 PID 4992 wrote to memory of 424 4992 AmongusHack.exe 106 PID 4992 wrote to memory of 424 4992 AmongusHack.exe 106 PID 424 wrote to memory of 3524 424 AmongusHack.exe 107 PID 424 wrote to memory of 3524 424 AmongusHack.exe 107 PID 424 wrote to memory of 3524 424 AmongusHack.exe 107 PID 3524 wrote to memory of 4060 3524 AmongusHack.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"8⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"9⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"10⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"11⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"12⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"13⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"14⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"15⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"16⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"17⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"18⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"19⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"20⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"21⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"22⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"23⤵
- Checks computer location settings
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"24⤵
- Checks computer location settings
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"25⤵
- Checks computer location settings
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"26⤵PID:4728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496B
MD55b4789d01bb4d7483b71e1a35bce6a8b
SHA1de083f2131c9a763c0d1810c97a38732146cffbf
SHA256e248cef9500ed6e0c9f99d72a2a6a36955a5f0cfc0725748ef25a733cc8282f6
SHA512357e18ef30430e4b9cc4f2569b9735b1cd12f934c83162e4de78ac29ba9703b63ddb624ccc22afd5a5868f6e9d91a3c64581846abac22e9625f5b2e3d80b3ede