Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 07:23

General

  • Target

    630d07b4ac989145ad123809ef4ba4271e82b8076e9143f75bd467c232bdfbb6.exe

  • Size

    388KB

  • MD5

    66d80e9a14fc25dcc2e0973053c41380

  • SHA1

    bb0f2a226a47a042b9cac18d7a85b5133cb9094c

  • SHA256

    630d07b4ac989145ad123809ef4ba4271e82b8076e9143f75bd467c232bdfbb6

  • SHA512

    04e60b3b2576543a9a82cd9b501455e2199bf77f936992c9262aa527278193bda34d3915ab0e619049cbd7ad01c8acbc7a016870b2de275c6361fd976e3ad447

  • SSDEEP

    3072:HQRCawi04RcJQPf+CtfOCQCJH1kaYZDAZ7CzeMQQ2GX4GsC6/vbgV3VqKPIktlAd:HwiwfYZ47Me0TxsCeveQKsN0pLXJVQt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\630d07b4ac989145ad123809ef4ba4271e82b8076e9143f75bd467c232bdfbb6.exe
    "C:\Users\Admin\AppData\Local\Temp\630d07b4ac989145ad123809ef4ba4271e82b8076e9143f75bd467c232bdfbb6.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\SysWOW64\system.exe
      C:\Windows\system32\system.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Windows\SysWOW64\Rundll32.exe
        Rundll32 C:\Windows\system32\jusekfaa.dll Exbcute
        3⤵
        • Checks computer location settings
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Windows\SysWOW64\net.exe
          net stop WinDefend
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop WinDefend
            5⤵
              PID:3744
          • C:\Windows\SysWOW64\net.exe
            net stop MpsSvc
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2224
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop MpsSvc
              5⤵
                PID:5012
            • C:\Windows\SysWOW64\sc.exe
              sc config WinDefend start= disabled
              4⤵
              • Launches sc.exe
              PID:4052
            • C:\Windows\SysWOW64\sc.exe
              sc config MpsSvc start= disabled
              4⤵
              • Launches sc.exe
              PID:1864
            • C:\Windows\SysWOW64\sc.exe
              sc stop ZhuDongFangYu
              4⤵
              • Launches sc.exe
              PID:1572
            • C:\Windows\SysWOW64\sc.exe
              sc delete ZhuDongFangYu
              4⤵
              • Launches sc.exe
              PID:3704
            • C:\Windows\SysWOW64\sc.exe
              sc stop 360rp
              4⤵
              • Launches sc.exe
              PID:5036
            • C:\Windows\SysWOW64\sc.exe
              sc delete 360rp
              4⤵
              • Launches sc.exe
              PID:3624
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" stop PolicyAgent
              4⤵
              • Launches sc.exe
              PID:4988
          • C:\Windows\SysWOW64\Rundll32.exe
            Rundll32 C:\Windows\system32\onbjkfaa.dll Exbcute
            3⤵
            • Loads dropped DLL
            • Adds Run key to start application
            • Enumerates connected drives
            • Suspicious behavior: EnumeratesProcesses
            PID:3860
        • C:\Users\Admin\AppData\Local\Temp\630d07b4ac989145ad123809ef4ba4271e82b8076e9143f75bd467c232bdfbb6.exe
          C:\Users\Admin\AppData\Local\Temp\630d07b4ac989145ad123809ef4ba4271e82b8076e9143f75bd467c232bdfbb6.exe
          2⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4380

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\630d07b4ac989145ad123809ef4ba4271e82b8076e9143f75bd467c232bdfbb6.exe

        Filesize

        236KB

        MD5

        d3f68a63420e039f1c2bbf745b728657

        SHA1

        84336e472aca29e3ee9abc503488ed14c303ec76

        SHA256

        9eb2f6e8085318bf96b28bcf6e66ed342dcf06d0d38cf39b562b24b1c175a154

        SHA512

        23dc998cad93a1a32888e2d2bf235f18d0609133f0acc13e5caa5c0ce671c466cb2bce3540f37e0b5008089e2f1a3bf003ea941144f692452d1041eaad4af258

      • C:\Users\Admin\AppData\Local\Temp\CC1.tmp

        Filesize

        4.3MB

        MD5

        6c7cdd25c2cb0073306eb22aebfc663f

        SHA1

        a1eba8ab49272b9852fe6a543677e8af36271248

        SHA256

        58280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705

        SHA512

        17344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6

      • C:\Windows\SysWOW64\jusekfaa.dll

        Filesize

        76KB

        MD5

        ca776bc0819d2b0f881a9b7604179b95

        SHA1

        9e5b4780724f21ff37a304b32160e22c5a2ec07c

        SHA256

        630eeb664f38a4e6c9ec48e94306d76db364222ba003b89a42a84ee85dec86b5

        SHA512

        bd18126d4fb75b96ef412d6a87b33fa90e4053fd2b2b6e644a45c136c72163d38c8cd4086ac5bf47fd814cdec1046dc6d2cc300af2d8f69b339fc216e0705031

      • C:\Windows\SysWOW64\jusekfaa.dll

        Filesize

        76KB

        MD5

        ca776bc0819d2b0f881a9b7604179b95

        SHA1

        9e5b4780724f21ff37a304b32160e22c5a2ec07c

        SHA256

        630eeb664f38a4e6c9ec48e94306d76db364222ba003b89a42a84ee85dec86b5

        SHA512

        bd18126d4fb75b96ef412d6a87b33fa90e4053fd2b2b6e644a45c136c72163d38c8cd4086ac5bf47fd814cdec1046dc6d2cc300af2d8f69b339fc216e0705031

      • C:\Windows\SysWOW64\onbjkfaa.dll

        Filesize

        23KB

        MD5

        2466c49d6177df75c3abf241561047e6

        SHA1

        5a6926f977ef390efa3b51fe6ce41ce9a9f36d51

        SHA256

        bdc5a2378da7ee275161ca3433f966445ab519b49bb2b7f9ee5ecef80b8affaa

        SHA512

        b830aac9e85e8c96d59e7efdb43994c5197e9fa76b1809dd6cd832748e11cf77be198ef4362c94d0652d7ca833227e7e2c1017559ede5673ca65e85e46e42e11

      • C:\Windows\SysWOW64\onbjkfaa.dll

        Filesize

        23KB

        MD5

        2466c49d6177df75c3abf241561047e6

        SHA1

        5a6926f977ef390efa3b51fe6ce41ce9a9f36d51

        SHA256

        bdc5a2378da7ee275161ca3433f966445ab519b49bb2b7f9ee5ecef80b8affaa

        SHA512

        b830aac9e85e8c96d59e7efdb43994c5197e9fa76b1809dd6cd832748e11cf77be198ef4362c94d0652d7ca833227e7e2c1017559ede5673ca65e85e46e42e11

      • C:\Windows\SysWOW64\system.exe

        Filesize

        144KB

        MD5

        58348b85711250c0af2176f5dc7257bf

        SHA1

        1a224e41faff19a5e91ed0a75d9bf85fdcef4b40

        SHA256

        002b5aaaa2c08b770db90a99062a47197eafcdd0d32c1358a23b8b0c4e4e981d

        SHA512

        beb254eebfb9321b568e8a3c6da0c55e7132e7d64f27d98f5064c5e88c57fc7d57a961149a6959b61e4dca1348caef157d90b758db57e35fa205d2a63c10af4f

      • C:\Windows\SysWOW64\system.exe

        Filesize

        144KB

        MD5

        58348b85711250c0af2176f5dc7257bf

        SHA1

        1a224e41faff19a5e91ed0a75d9bf85fdcef4b40

        SHA256

        002b5aaaa2c08b770db90a99062a47197eafcdd0d32c1358a23b8b0c4e4e981d

        SHA512

        beb254eebfb9321b568e8a3c6da0c55e7132e7d64f27d98f5064c5e88c57fc7d57a961149a6959b61e4dca1348caef157d90b758db57e35fa205d2a63c10af4f

      • memory/4808-149-0x0000000000400000-0x0000000000461000-memory.dmp

        Filesize

        388KB

      • memory/4808-132-0x0000000000400000-0x0000000000461000-memory.dmp

        Filesize

        388KB