Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe
Resource
win10v2004-20220901-en
General
-
Target
75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe
-
Size
14KB
-
MD5
cc38d96413fd60ef3e64ef58d27101e6
-
SHA1
e5eeef43a698c992c99691939a885dd7f937cb75
-
SHA256
75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308
-
SHA512
c5e768484e23751640a992461885671b2f6d2ec5f434146fd723a8a3be4b5090e84f54db9ae9cb2b05c52dbc00576dab719e8758903e76ba37e5a239d00cf528
-
SSDEEP
384:jxNR77zN0w638TNFTBs16QCzOcg9FgiKa:jxN17zn66W2zONFgiKa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4448 4828 75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe 84 PID 4828 wrote to memory of 4448 4828 75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe 84 PID 4828 wrote to memory of 4448 4828 75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe 84 PID 4448 wrote to memory of 1976 4448 cmd.exe 86 PID 4448 wrote to memory of 1976 4448 cmd.exe 86 PID 4448 wrote to memory of 1976 4448 cmd.exe 86 PID 4828 wrote to memory of 372 4828 75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe 88 PID 4828 wrote to memory of 372 4828 75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe 88 PID 4828 wrote to memory of 372 4828 75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1976 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe"C:\Users\Admin\AppData\Local\Temp\75eb10f7d4f2503abf1d36175e5de50df1efbb7853aa9ed9ecbb98f827847308.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat""2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\attrib.exeattrib -r -a -s -h c:\boot.ini3⤵
- Views/modifies file attributes
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "2⤵PID:372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dfbec89c53cc55f499f2f84f92a08ad9
SHA1272777956848fcecfa4548496594a1066c59ee74
SHA256edc7e51df8ac5debc7007d77779f1a0074efa6fd77cb9b127eb415f37a44b455
SHA512db7864d7acdd9caf4cf765294e350aad5cf03b9c84bde54e99f296c947c65d0cebfdb4a4081d3ed3a89739f9583fc26cca5801b23f6a8d8281bd343b1fe1e4d7
-
Filesize
164B
MD53d4fda05c7e6bac8194c9a5eb2b97b23
SHA19e4b269d07896a410f2c4b37cde5b83b3ace580e
SHA256a63904f88a513617b392b0a450a78198a3b1d808f07a82ca6c6da9280736aa96
SHA5123495bbf0eeef62105350f57984b114ff6faa8eb8a5423ad3d3d72adea8d12e35fb7218951aa5968d7330178c8db82b014c97ffd6ff6518200b95cc9750a2b3d0