Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/01/2025, 06:33

250114-hbk26s1rem 10

14/01/2025, 06:12

250114-gyapaa1mfq 10

19/06/2022, 16:53

220619-vdyr9sfcgl 10

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19/06/2022, 16:53

General

  • Target

    AmongusHack.exe

  • Size

    202KB

  • MD5

    5c39bb532bd116ae2c9e47528c9f81f3

  • SHA1

    4af704758e4d281997df43811fcd759e4b3ea755

  • SHA256

    09eeb778d2b787fb4a329923ce022d54c8b980213698d74487913700e40b5f1e

  • SHA512

    18cd104f1d9ec1c6b52f0461d9cbba4483bad21074805e0e8c425045d77e439e795b19953964abc791f7b17dc7247d4481c2e4e6083019e8e5b4ca704682d320

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 25 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
    "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
      "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
        "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3684
        • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
          "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3508
          • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
            "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
            5⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:216
            • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
              "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
              6⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:3756
              • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                7⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:4236
                • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                  "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                  8⤵
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:2644
                  • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                    "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                    9⤵
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:4240
                    • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                      "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                      10⤵
                      • Checks computer location settings
                      • Suspicious use of WriteProcessMemory
                      PID:1716
                      • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                        "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                        11⤵
                        • Checks computer location settings
                        • Suspicious use of WriteProcessMemory
                        PID:2660
                        • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                          "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                          12⤵
                          • Checks computer location settings
                          • Suspicious use of WriteProcessMemory
                          PID:2216
                          • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                            "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                            13⤵
                            • Checks computer location settings
                            • Suspicious use of WriteProcessMemory
                            PID:1272
                            • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                              "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                              14⤵
                              • Checks computer location settings
                              • Suspicious use of WriteProcessMemory
                              PID:2164
                              • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                15⤵
                                • Checks computer location settings
                                • Suspicious use of WriteProcessMemory
                                PID:4016
                                • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                  "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                  16⤵
                                  • Checks computer location settings
                                  • Suspicious use of WriteProcessMemory
                                  PID:3020
                                  • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                    "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                    17⤵
                                    • Checks computer location settings
                                    • Suspicious use of WriteProcessMemory
                                    PID:3500
                                    • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                      "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                      18⤵
                                      • Checks computer location settings
                                      • Suspicious use of WriteProcessMemory
                                      PID:3044
                                      • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                        "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                        19⤵
                                        • Checks computer location settings
                                        • Suspicious use of WriteProcessMemory
                                        PID:3156
                                        • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                          "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                          20⤵
                                          • Checks computer location settings
                                          • Suspicious use of WriteProcessMemory
                                          PID:4992
                                          • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                            "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                            21⤵
                                            • Checks computer location settings
                                            • Suspicious use of WriteProcessMemory
                                            PID:424
                                            • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                              "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                              22⤵
                                              • Checks computer location settings
                                              • Suspicious use of WriteProcessMemory
                                              PID:3524
                                              • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                                "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                                23⤵
                                                • Checks computer location settings
                                                PID:4060
                                                • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                                  24⤵
                                                  • Checks computer location settings
                                                  PID:2024
                                                  • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                                    25⤵
                                                    • Checks computer location settings
                                                    PID:4336
                                                    • C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\AmongusHack.exe"
                                                      26⤵
                                                        PID:4728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\AmongusHack.exe.log

      Filesize

      496B

      MD5

      5b4789d01bb4d7483b71e1a35bce6a8b

      SHA1

      de083f2131c9a763c0d1810c97a38732146cffbf

      SHA256

      e248cef9500ed6e0c9f99d72a2a6a36955a5f0cfc0725748ef25a733cc8282f6

      SHA512

      357e18ef30430e4b9cc4f2569b9735b1cd12f934c83162e4de78ac29ba9703b63ddb624ccc22afd5a5868f6e9d91a3c64581846abac22e9625f5b2e3d80b3ede

    • memory/216-145-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/216-143-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/424-191-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/424-193-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/1272-169-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/1272-167-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/1716-160-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/1716-158-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2024-200-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2024-202-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2164-172-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2164-170-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2216-164-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2216-166-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2644-154-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2644-152-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2660-161-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/2660-163-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3020-178-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3020-176-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3044-182-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3044-184-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3156-185-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3156-187-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3500-179-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3500-181-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3508-140-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3508-142-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3524-196-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3524-194-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3684-137-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3684-139-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3756-148-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/3756-146-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4016-175-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4016-173-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4060-199-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4060-197-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4184-134-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4184-136-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4236-149-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4236-151-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4240-157-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4240-155-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4336-203-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4336-205-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4572-133-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4572-130-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4728-206-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4992-188-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB

    • memory/4992-190-0x0000000074650000-0x0000000074C01000-memory.dmp

      Filesize

      5.7MB