Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe
Resource
win10-20220812-en
General
-
Target
f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe
-
Size
1.8MB
-
MD5
ad9a794fbe736a06f218901c6d4fb2d7
-
SHA1
e2def1777d0bc416564124526c74408b73bec576
-
SHA256
f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100
-
SHA512
2e311a7bb74176474435e762c96df3a1a920136726a873dad9741e5e70e6d4a5a06e2604d8db0df3031cf4672716dbc37e227227ed9f424566eda35e2d435095
-
SSDEEP
49152:4unQlj/NXedYPLKRIPx00ILQzew5sB5X2Rri+oj6NmO34G:4KgjYdcgIJxzj+GRRojHK
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4388 rundll32.exe 4388 rundll32.exe 4080 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4796 2808 f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe 66 PID 2808 wrote to memory of 4796 2808 f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe 66 PID 2808 wrote to memory of 4796 2808 f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe 66 PID 4796 wrote to memory of 4388 4796 control.exe 68 PID 4796 wrote to memory of 4388 4796 control.exe 68 PID 4796 wrote to memory of 4388 4796 control.exe 68 PID 4388 wrote to memory of 1408 4388 rundll32.exe 69 PID 4388 wrote to memory of 1408 4388 rundll32.exe 69 PID 1408 wrote to memory of 4080 1408 RunDll32.exe 70 PID 1408 wrote to memory of 4080 1408 RunDll32.exe 70 PID 1408 wrote to memory of 4080 1408 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe"C:\Users\Admin\AppData\Local\Temp\f5e662e15d387e7075000ec289bb29b40223e6ce73a887b5672e87e540606100.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\BoFogA.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BoFogA.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BoFogA.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\BoFogA.cPl",5⤵
- Loads dropped DLL
PID:4080
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5d1ab0f7e59cc0ec671c1fbb29e01ee0c
SHA170e99fa7b894a8882d795d1758b952e8c2099d6c
SHA256ba4315e434740fa217d1f6e0103caf9e3f78dc9c2ad8047619603a14d3fec369
SHA512fdba930e08c3e6e7bf3147654a449f97ae4a41d256cba84d561acf2028b0d37b28de0ae70f38aa25b29fc873e1701eac8813070842a9f1a175dabaa96bfff23a
-
Filesize
2.3MB
MD5d1ab0f7e59cc0ec671c1fbb29e01ee0c
SHA170e99fa7b894a8882d795d1758b952e8c2099d6c
SHA256ba4315e434740fa217d1f6e0103caf9e3f78dc9c2ad8047619603a14d3fec369
SHA512fdba930e08c3e6e7bf3147654a449f97ae4a41d256cba84d561acf2028b0d37b28de0ae70f38aa25b29fc873e1701eac8813070842a9f1a175dabaa96bfff23a
-
Filesize
2.3MB
MD5d1ab0f7e59cc0ec671c1fbb29e01ee0c
SHA170e99fa7b894a8882d795d1758b952e8c2099d6c
SHA256ba4315e434740fa217d1f6e0103caf9e3f78dc9c2ad8047619603a14d3fec369
SHA512fdba930e08c3e6e7bf3147654a449f97ae4a41d256cba84d561acf2028b0d37b28de0ae70f38aa25b29fc873e1701eac8813070842a9f1a175dabaa96bfff23a
-
Filesize
2.3MB
MD5d1ab0f7e59cc0ec671c1fbb29e01ee0c
SHA170e99fa7b894a8882d795d1758b952e8c2099d6c
SHA256ba4315e434740fa217d1f6e0103caf9e3f78dc9c2ad8047619603a14d3fec369
SHA512fdba930e08c3e6e7bf3147654a449f97ae4a41d256cba84d561acf2028b0d37b28de0ae70f38aa25b29fc873e1701eac8813070842a9f1a175dabaa96bfff23a