Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    170s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 04:03

General

  • Target

    14dfd8cece4efbb1e161457619800f87eb55b7fae9bd127fcf89e4b6198356dd.exe

  • Size

    100KB

  • MD5

    70f456c436ccb742bead93271163569d

  • SHA1

    c30831e819780d60923ca15e19bf761f8b7ae146

  • SHA256

    14dfd8cece4efbb1e161457619800f87eb55b7fae9bd127fcf89e4b6198356dd

  • SHA512

    d988638746a36be3fa8c30c3ded43069f20967342a826dbd1b27b29851bdf99165e8860438c36470d03b8c5560fed06e267b6c45e1d696f01a684ed8183a9e30

  • SSDEEP

    1536:66tG582NTzwoMGAc4ohrPXo+73Rez8b0SywNIjni:Yw3urPX7CwCni

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14dfd8cece4efbb1e161457619800f87eb55b7fae9bd127fcf89e4b6198356dd.exe
    "C:\Users\Admin\AppData\Local\Temp\14dfd8cece4efbb1e161457619800f87eb55b7fae9bd127fcf89e4b6198356dd.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:484
    • C:\Users\Admin\blroal.exe
      "C:\Users\Admin\blroal.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\blroal.exe

    Filesize

    100KB

    MD5

    6fa293dd3c41288f2daba97c75714f26

    SHA1

    3a5461e4f504a8ba27334ca3d88bcb329d7e846a

    SHA256

    6a06a28208c3778c3b4cee0e93fe1d285b24680f5f1e2ec85a9ca43813930754

    SHA512

    10e6bd798f8c866c3839d3865d674765d728066cae95df8f4e57ecad1fec2aff06f7d17338621251a98ad3582a4aa4ab4a13dd9e08b51df13fa713bbca73e414

  • C:\Users\Admin\blroal.exe

    Filesize

    100KB

    MD5

    6fa293dd3c41288f2daba97c75714f26

    SHA1

    3a5461e4f504a8ba27334ca3d88bcb329d7e846a

    SHA256

    6a06a28208c3778c3b4cee0e93fe1d285b24680f5f1e2ec85a9ca43813930754

    SHA512

    10e6bd798f8c866c3839d3865d674765d728066cae95df8f4e57ecad1fec2aff06f7d17338621251a98ad3582a4aa4ab4a13dd9e08b51df13fa713bbca73e414