Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 05:18

General

  • Target

    26dfe977ecf5028d3e001a7cc86be5ed4caa4ec5274b88854d21a93fe56e4806.exe

  • Size

    212KB

  • MD5

    f072cbe3aa6ec798d3d74db2a9a3e6a0

  • SHA1

    a1329d247f94a92eceb5680367d9847ba031c1f2

  • SHA256

    26dfe977ecf5028d3e001a7cc86be5ed4caa4ec5274b88854d21a93fe56e4806

  • SHA512

    3e48d68a96e5ac53f0bfc901f41d28f8aa4ce01fc673dcb2ccfd8831672a49bdb19171b8c5b6ce04be2090e44c8df8cdaab71ac246e7c206e4472436dd03c21d

  • SSDEEP

    6144:qljASXqcAP6A5PACApvAPDyoAJMShfl4QxsYBO7Czn8DmJ:qJa+IGhflP

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26dfe977ecf5028d3e001a7cc86be5ed4caa4ec5274b88854d21a93fe56e4806.exe
    "C:\Users\Admin\AppData\Local\Temp\26dfe977ecf5028d3e001a7cc86be5ed4caa4ec5274b88854d21a93fe56e4806.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3560
    • \??\c:\Program FilesJ36X4O.exe
      "c:\Program FilesJ36X4O.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.nyni.info:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4996
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.nyni.info:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        PID:5008
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
        PID:4868

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program FilesJ36X4O.exe

      Filesize

      36KB

      MD5

      7e82574b74e97688782ba6c2f1371736

      SHA1

      f22de6923db2939157a10d508013f755b4551840

      SHA256

      ac732cb694e7a0983da7ffeaa6e78d55053ef4380007eaea47bb35aa35819853

      SHA512

      eb746112be466a6d5a04d9b9732709e238d9edb3e027afc7183fe959dc7b79a415e50ddefb28c40a1d52125576a0fea83e15082d8a1d677fea009bb780a8f37d

    • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

      Filesize

      486B

      MD5

      ce454be99ea889cd057525701dcfa3ed

      SHA1

      a599baf0b858d5c920a2037d3de7744045113b08

      SHA256

      f70634c7c8096612dbc52c81a40a58782fe9749263fa4935990f43081e47f67b

      SHA512

      872604bb5349c6816d7cc89564976fa21f3dbc03e77686828ea397e3c4208efbc3af7ba0b5d1fda1353c766512c326308de62a73d0621d79ed8788321be987a5

    • \??\c:\Program FilesJ36X4O.exe

      Filesize

      36KB

      MD5

      7e82574b74e97688782ba6c2f1371736

      SHA1

      f22de6923db2939157a10d508013f755b4551840

      SHA256

      ac732cb694e7a0983da7ffeaa6e78d55053ef4380007eaea47bb35aa35819853

      SHA512

      eb746112be466a6d5a04d9b9732709e238d9edb3e027afc7183fe959dc7b79a415e50ddefb28c40a1d52125576a0fea83e15082d8a1d677fea009bb780a8f37d