Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 13:13 UTC
Behavioral task
behavioral1
Sample
58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe
Resource
win7-20220812-en
General
-
Target
58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe
-
Size
298KB
-
MD5
13066e92e8a49557d4a31b2d99735ba2
-
SHA1
9bbfb875199972c7aca96d01be629f38533b0657
-
SHA256
58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b
-
SHA512
016b1b6b5dfbdaf166fbb9ea6802c44bf81f1f838ae0fb35150b073d023961e8bca1e81cfea42e20b6dbf292673e9b35b2b06d17fad4258ef0d1870153f8f09d
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYw:v6Wq4aaE6KwyF5L0Y2D1PqLX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 svhost.exe -
resource yara_rule behavioral2/memory/4668-132-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4668-133-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/files/0x000200000001e2c6-135.dat upx behavioral2/files/0x000200000001e2c6-136.dat upx behavioral2/memory/4740-137-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4668-138-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\o: svhost.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4668-133-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/4740-137-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/4668-138-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4740 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe 4740 svhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4740 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 82 PID 4668 wrote to memory of 4740 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 82 PID 4668 wrote to memory of 4740 4668 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe"C:\Users\Admin\AppData\Local\Temp\58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4740
-
Network
-
Remote address:8.8.8.8:53Request97.97.242.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request176.122.125.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpaIN PTRResponse
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
260 B 5
-
71 B 145 B 1 1
DNS Request
97.97.242.52.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
176.122.125.40.in-addr.arpa
-
118 B 204 B 1 1
DNS Request
9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD56d4a8d2ac9fdda5dfae30dc3fa4120bd
SHA1293e2f276b2c6cbbd09a8841ecfd92411865008e
SHA256ea2b8c4462a286bbebd84d69922fe0155c25ad97853daf7e89225542084b0855
SHA512be50156125c1e272048d4eeb219b57eb78e758a5c0e69e4f1b637f1d85816d08e53c1e7f7605c62df482b1666e36e2cbcd6ab53b421f6075e2eda5f4c817da0c
-
Filesize
298KB
MD56d4a8d2ac9fdda5dfae30dc3fa4120bd
SHA1293e2f276b2c6cbbd09a8841ecfd92411865008e
SHA256ea2b8c4462a286bbebd84d69922fe0155c25ad97853daf7e89225542084b0855
SHA512be50156125c1e272048d4eeb219b57eb78e758a5c0e69e4f1b637f1d85816d08e53c1e7f7605c62df482b1666e36e2cbcd6ab53b421f6075e2eda5f4c817da0c