Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe
Resource
win10v2004-20220812-en
General
-
Target
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe
-
Size
93KB
-
MD5
044632b9a50c97acc9e74d3f5e1eb801
-
SHA1
e560d1275ea235741ef43628bbca7950316024fe
-
SHA256
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10
-
SHA512
4b1c022bb377d218a2a6f88e3e770b276d31685c61d2c95070bbfbe74963b64fd35d7bc6b22465ff8e5e2ce0f151b5db9d7f6352604ea0b2719567ae13606f9f
-
SSDEEP
1536:3tXEgfR+dxrrAPvCFghMO8zCThiztILprD1KdV:3tUgJoP6Cc8zEiztO16
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3536 csrss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3536 set thread context of 4904 3536 csrss.exe 82 PID 3536 set thread context of 0 3536 csrss.exe PID 3536 set thread context of 0 3536 csrss.exe PID 3536 set thread context of 0 3536 csrss.exe PID 3536 set thread context of 0 3536 csrss.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\csrss.exe 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 1916 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe Token: SeSystemtimePrivilege 1916 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3536 1916 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe 81 PID 1916 wrote to memory of 3536 1916 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe 81 PID 1916 wrote to memory of 3536 1916 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe 81 PID 3536 wrote to memory of 4904 3536 csrss.exe 82 PID 3536 wrote to memory of 4904 3536 csrss.exe 82 PID 3536 wrote to memory of 4904 3536 csrss.exe 82 PID 3536 wrote to memory of 4904 3536 csrss.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe"C:\Users\Admin\AppData\Local\Temp\3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\svchost.exesvchost C:\Windows\csrss.exe3⤵PID:4904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5044632b9a50c97acc9e74d3f5e1eb801
SHA1e560d1275ea235741ef43628bbca7950316024fe
SHA2563e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10
SHA5124b1c022bb377d218a2a6f88e3e770b276d31685c61d2c95070bbfbe74963b64fd35d7bc6b22465ff8e5e2ce0f151b5db9d7f6352604ea0b2719567ae13606f9f
-
Filesize
93KB
MD5044632b9a50c97acc9e74d3f5e1eb801
SHA1e560d1275ea235741ef43628bbca7950316024fe
SHA2563e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10
SHA5124b1c022bb377d218a2a6f88e3e770b276d31685c61d2c95070bbfbe74963b64fd35d7bc6b22465ff8e5e2ce0f151b5db9d7f6352604ea0b2719567ae13606f9f