Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 00:40

General

  • Target

    2fd90be05aee0e3e9712196e5656fcf551c4c6a655e3f215ce466b421611640c.exe

  • Size

    206KB

  • MD5

    2eab6e3f8cda158fe21e854f9c2c3420

  • SHA1

    4d133fa79988392a00428e836bb8542aed213b14

  • SHA256

    2fd90be05aee0e3e9712196e5656fcf551c4c6a655e3f215ce466b421611640c

  • SHA512

    c798c8bce2b6912d2b9c8d12abd04389f7ce3c55f74a80270c4c5e154fcf4edd3bfbddb8f29980e42e580096196304f7cbbd5c08fd972cc341cd47d3a3490b76

  • SSDEEP

    3072:+dqI+Xr1tXwt85ZCZD0aEoWLBAmyUxEJ9cWYpDeCFDxp0:+/gfXwt85ZCZD0jLBAmyUxKcWY3F70

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fd90be05aee0e3e9712196e5656fcf551c4c6a655e3f215ce466b421611640c.exe
    "C:\Users\Admin\AppData\Local\Temp\2fd90be05aee0e3e9712196e5656fcf551c4c6a655e3f215ce466b421611640c.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3948
    • \??\c:\windows\SysWOW64\explorer.exe
      c:\windows\system32\explorer.exe
      2⤵
      • Modifies registry class
      PID:3728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads