Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 15:35

General

  • Target

    0f5cdca61df03c1f58c3400f929ffd2a80f19fab45776a129736023f8728ad22.exe

  • Size

    224KB

  • MD5

    3fc55e589cf8984bc00048f247fa807a

  • SHA1

    3bd163ef033c071b2ee701d178006a1f9632bf3f

  • SHA256

    0f5cdca61df03c1f58c3400f929ffd2a80f19fab45776a129736023f8728ad22

  • SHA512

    084b7fd5f42aa5a2dfee1d079772ef5ef9002ce52ead4ad51e4cb02f45e42acecdeadca77e7775fefff17dc9046969b894ce08d38003d42d8988ba959d3cdf15

  • SSDEEP

    3072:LXyqNsMoBuhZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2+l:+qN5Fp4LnbmlrZW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f5cdca61df03c1f58c3400f929ffd2a80f19fab45776a129736023f8728ad22.exe
    "C:\Users\Admin\AppData\Local\Temp\0f5cdca61df03c1f58c3400f929ffd2a80f19fab45776a129736023f8728ad22.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\diulup.exe
      "C:\Users\Admin\diulup.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\diulup.exe

    Filesize

    224KB

    MD5

    399d26e5fa53eba7328533f348f289a2

    SHA1

    c84491aedc58b7d3351b5edae3295b835fe92f1f

    SHA256

    9510cec5465a3f675e22bbdb3f9e8b85f298a015888e0719cd2d9b04d798ab45

    SHA512

    78814bef74957100191b95d28ca1b29ff66fd6a80f93506b5c8ad7151500eed6b1da27a4c8c7fbdf5e1f36626353cff9b3340329a1a518013d3acbe3c4607986

  • C:\Users\Admin\diulup.exe

    Filesize

    224KB

    MD5

    399d26e5fa53eba7328533f348f289a2

    SHA1

    c84491aedc58b7d3351b5edae3295b835fe92f1f

    SHA256

    9510cec5465a3f675e22bbdb3f9e8b85f298a015888e0719cd2d9b04d798ab45

    SHA512

    78814bef74957100191b95d28ca1b29ff66fd6a80f93506b5c8ad7151500eed6b1da27a4c8c7fbdf5e1f36626353cff9b3340329a1a518013d3acbe3c4607986

  • memory/1076-140-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1076-142-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2820-132-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2820-141-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB