Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe
Resource
win10v2004-20220901-en
General
-
Target
c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe
-
Size
280KB
-
MD5
49f57039c3956225756f544bb987e3c0
-
SHA1
cee23d2454fd080f7bd871b06c4846ba00318759
-
SHA256
c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6
-
SHA512
1dffbea58f49c1c709439c3da8a6c16cd2705903b5e81cee6d960fb277be1e824ff93c2b9c2d0279d43a9e1c33ec280a6eb45946d2be836d089745d7a542c107
-
SSDEEP
6144:SsJvXdjle3O25F06ZWzC9MY/d7pUXoxTF0fLqOL1pOLfr7HHo:LvXve3kP0d/F+D/LKLfr7no
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 2572 rUNDLL32.exe 3368 Rundll32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "Rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Adobe\\vphrlzam.dll,DllCanUnloadNow" c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2572 rUNDLL32.exe 2572 rUNDLL32.exe 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 3368 Rundll32.exe 3368 Rundll32.exe 3368 Rundll32.exe 3368 Rundll32.exe 3368 Rundll32.exe 3368 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3368 Rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2572 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 84 PID 3028 wrote to memory of 2572 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 84 PID 3028 wrote to memory of 2572 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 84 PID 3028 wrote to memory of 3368 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 86 PID 3028 wrote to memory of 3368 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 86 PID 3028 wrote to memory of 3368 3028 c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe"C:\Users\Admin\AppData\Local\Temp\c43e594b3cf70a6264912ddd916e96b5c8c86c5c89a70b2f00315607389046f6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\rUNDLL32.exerUNDLL32 "C:\Users\Admin\AppData\Local\Temp\snstnnoj\snstnnoj.dll",DllRegisterServer2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Adobe\vphrlzam.dll,DllCanUnloadNow2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD5a8f6b06e26a017e6d1ae000b9e27b631
SHA1f6ca39e93612dc7d40e5c7509b229d4505267f26
SHA2568db4c688301cf923f12c56fc47f5a830316e3544a822a731964400e2d76f2b8c
SHA5125cb5f6e6e78a9f61bfb77d566c2ee54a4581b0c27627432d160667d75c73144c5fb6cb3b9fad08a46b85997e605946b341638e74c744c3fa11efd3ed9010008e
-
Filesize
538KB
MD5a8f6b06e26a017e6d1ae000b9e27b631
SHA1f6ca39e93612dc7d40e5c7509b229d4505267f26
SHA2568db4c688301cf923f12c56fc47f5a830316e3544a822a731964400e2d76f2b8c
SHA5125cb5f6e6e78a9f61bfb77d566c2ee54a4581b0c27627432d160667d75c73144c5fb6cb3b9fad08a46b85997e605946b341638e74c744c3fa11efd3ed9010008e
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
538KB
MD5a8f6b06e26a017e6d1ae000b9e27b631
SHA1f6ca39e93612dc7d40e5c7509b229d4505267f26
SHA2568db4c688301cf923f12c56fc47f5a830316e3544a822a731964400e2d76f2b8c
SHA5125cb5f6e6e78a9f61bfb77d566c2ee54a4581b0c27627432d160667d75c73144c5fb6cb3b9fad08a46b85997e605946b341638e74c744c3fa11efd3ed9010008e
-
Filesize
332KB
MD51ed561899384bf22530cf843ddebdc5d
SHA144d73844fbe2225457d0f91f39e36c162ffc2a9f
SHA256e26e8cb47f614fe6b4cc569752420064bd1c48c87be0f74355e5bc5afaea6b8c
SHA512e3e6a4128d9f003c547e7c0bcdf2178a68431f8a2f858eb45388c95794111235ce6f65f162bf826d451de18f79440a47c2a32222e89f4b7eef4c8795e99c08e3
-
Filesize
332KB
MD51ed561899384bf22530cf843ddebdc5d
SHA144d73844fbe2225457d0f91f39e36c162ffc2a9f
SHA256e26e8cb47f614fe6b4cc569752420064bd1c48c87be0f74355e5bc5afaea6b8c
SHA512e3e6a4128d9f003c547e7c0bcdf2178a68431f8a2f858eb45388c95794111235ce6f65f162bf826d451de18f79440a47c2a32222e89f4b7eef4c8795e99c08e3