Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
76s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2022, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp.exe
-
Size
44KB
-
MD5
d18cd40115084975be66a5581546d094
-
SHA1
7c2f20aa9b518162defd728d2ad88c18f4b78830
-
SHA256
afc7756b2e9479d748dc9424bf2639ff27107756e2a010a15e0002ccb0c270ce
-
SHA512
991178a124fa153896a87a5b8f9ee8aa17fb4fffa3adea11c6a9a180ffe73f220392a1edd0b180421539a03a36bb502c9dec4d6d2261fd0b3f25c79c0398ffcb
-
SSDEEP
768:6fXKTHyY+h6oDeQGPL4vzZq2o9W7GsxBbPr:eX2SCoDlGCq2iW7z
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0003000000022ddb-133.dat aspack_v212_v242 behavioral2/files/0x0003000000022ddb-135.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 616 DklsfF.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation DklsfF.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe DklsfF.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe DklsfF.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe DklsfF.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe DklsfF.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe DklsfF.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe DklsfF.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe DklsfF.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe DklsfF.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe DklsfF.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe DklsfF.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteshare.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe DklsfF.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\policytool.exe DklsfF.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\tnameserv.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe DklsfF.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe DklsfF.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe DklsfF.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe DklsfF.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe DklsfF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe DklsfF.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe DklsfF.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe DklsfF.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe DklsfF.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe DklsfF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe DklsfF.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe DklsfF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1680 wrote to memory of 616 1680 tmp.exe 83 PID 1680 wrote to memory of 616 1680 tmp.exe 83 PID 1680 wrote to memory of 616 1680 tmp.exe 83 PID 616 wrote to memory of 4988 616 DklsfF.exe 89 PID 616 wrote to memory of 4988 616 DklsfF.exe 89 PID 616 wrote to memory of 4988 616 DklsfF.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\DklsfF.exeC:\Users\Admin\AppData\Local\Temp\DklsfF.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0b672d79.bat" "3⤵PID:4988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5162c6ab859750fd8346b9cb7406420af
SHA171205a1b09d8958bcd4a29754aecf314ffb849dd
SHA2564ef530bd8e806e1159452d3d48d43b8207cb43c44cdfbe89fd4199c8b47fd56a
SHA51286703b2215caeb856ea288f507047eb29fb47efacaf40a4eb5d99e2260cd7b63a9ac259fd41eae94021b775d2695d195985af6a2d164c6cadd5b10789253a439
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e