Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 06:44

General

  • Target

    73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe.exe

  • Size

    156KB

  • MD5

    67b9e5cc88def4a5fe8969dc2e57c760

  • SHA1

    647614d75cfc68e398765dc0e079b6f09158159c

  • SHA256

    73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe

  • SHA512

    7b6418764d271b129177799970637cea7c4f6d3355521e5732361c25a82a0edc546c184edd2fdc25b322b6315fb2fc98aac5a1f5a189d097a8b0e9c7212aa778

  • SSDEEP

    1536:wCkumpuY0UBU8gRDGHPOGMmUbaxGAka+t/K9rCGaV9mw7Jqx8M+dzAb2QgRVt:UpuY0ya4UbaxqkCGaVD7JqfKAbHot

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe.exe
    "C:\Users\Admin\AppData\Local\Temp\73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\waokaiw.exe
      "C:\Users\Admin\waokaiw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\waokaiw.exe

    Filesize

    156KB

    MD5

    e76f09d21e21277876f5ce66ed0a55eb

    SHA1

    87f9156b703c50668a91114fb252d226fb8e0fd4

    SHA256

    767dfc4dee4e24179a110dcb32ced5022ff9c829a4cb1e17695a6ddeb563a20a

    SHA512

    665951e853b1ed3895230183afaeb8dc2f3804043ba99c5265f9b4f8acb31dc49b0d7646ce57fdf774af588194ef51c69f6f6ebf42a6f18e13a5bf783a421275

  • C:\Users\Admin\waokaiw.exe

    Filesize

    156KB

    MD5

    e76f09d21e21277876f5ce66ed0a55eb

    SHA1

    87f9156b703c50668a91114fb252d226fb8e0fd4

    SHA256

    767dfc4dee4e24179a110dcb32ced5022ff9c829a4cb1e17695a6ddeb563a20a

    SHA512

    665951e853b1ed3895230183afaeb8dc2f3804043ba99c5265f9b4f8acb31dc49b0d7646ce57fdf774af588194ef51c69f6f6ebf42a6f18e13a5bf783a421275