Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    156s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 23:20

General

  • Target

    8c6c62bda1ed74b462b518cd4481b6965aa88780d5911aa2088c1f131f051264.exe

  • Size

    196KB

  • MD5

    6bc3dcbc58d4c7b2f66045d95060f8c0

  • SHA1

    04b360ee724b88b80e57c66f923ed65f21806be3

  • SHA256

    8c6c62bda1ed74b462b518cd4481b6965aa88780d5911aa2088c1f131f051264

  • SHA512

    dfc773266cbc3fe12ffabc0cb0d7036f8accccca4ef4bcdf5909c4dcd01d536448433dd76ee9888f4f686d5c5191665dbd3fee9a0a895043c735e622fc2d7b7a

  • SSDEEP

    3072:aM65zTN7RH9Avf4Z53fpp0dL5qxpubZyejITv9fXFg1:1mTNJ0fC53Bp0dLiobP+v9fVa

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c6c62bda1ed74b462b518cd4481b6965aa88780d5911aa2088c1f131f051264.exe
    "C:\Users\Admin\AppData\Local\Temp\8c6c62bda1ed74b462b518cd4481b6965aa88780d5911aa2088c1f131f051264.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F57C.tmp.bat" >> NUL
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2 -w 1000
        3⤵
        • Runs ping.exe
        PID:3484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F57C.tmp.bat

    Filesize

    130B

    MD5

    ec87cceeeed3b94cfe3da392b2970e8b

    SHA1

    2becc7d8d50a59bf03298001262b156e8ad396d3

    SHA256

    7985f1ee99bb2a08f08bf95d6d6c99dec3c918f2694e19ae28b504841a001486

    SHA512

    a092949eec35e8abba034de7881a5940b8f301ef34a3a9523dba14d6a0e30fa7659b89a599f6803536077210466e42fa37cac535a710aaab152321390709558a