Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:04
Behavioral task
behavioral1
Sample
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe
Resource
win10v2004-20220812-en
General
-
Target
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe
-
Size
136KB
-
MD5
6eeaada50798013dd168e87338e5a9ad
-
SHA1
84efab6d3197f5079ee7e10696c5ea32d2f1e9ba
-
SHA256
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600
-
SHA512
d730ca61985204889e05859071330fa265c6cf4084b281b19b0f5ba906de7edab494855b3e2f8beefc0e89dad85bc3bdf4cea094cc66fef4d1956bef92211e67
-
SSDEEP
3072:nIqDfnQoB3+Lp7xV9I9Xde980plLFEb6G:IunQyAxrI9XABLlG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4808 ÓíÑÝÑ ÎÇã.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4808 ÓíÑÝÑ ÎÇã.exe 4808 ÓíÑÝÑ ÎÇã.exe 4808 ÓíÑÝÑ ÎÇã.exe 4808 ÓíÑÝÑ ÎÇã.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4808 3968 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 83 PID 3968 wrote to memory of 4808 3968 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 83 PID 3968 wrote to memory of 4808 3968 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 83 PID 4808 wrote to memory of 2576 4808 ÓíÑÝÑ ÎÇã.exe 51 PID 4808 wrote to memory of 2576 4808 ÓíÑÝÑ ÎÇã.exe 51 PID 4808 wrote to memory of 2576 4808 ÓíÑÝÑ ÎÇã.exe 51 PID 4808 wrote to memory of 2576 4808 ÓíÑÝÑ ÎÇã.exe 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe"C:\Users\Admin\AppData\Local\Temp\90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\ÓíÑÝÑ ÎÇã.exe"C:\Users\Admin\AppData\Local\Temp\ÓíÑÝÑ ÎÇã.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5e61e34288f0a9dd588999821579d6acf
SHA16324ba0e1efc9ff50be28dbd0e803419da3d61aa
SHA256caf7a144bc43684c5ecca9ae485847cdb404ae87d707ab4fe933f0abcc264c5e
SHA5120ea259cd56572898557f895ca567f190d31ca98f17c9c89317fb3e54166166341e167a6731ffb68953548c7f99e1caa3d4e511f6feb4ac0b94fb7412d8ebdc32
-
Filesize
56KB
MD5e61e34288f0a9dd588999821579d6acf
SHA16324ba0e1efc9ff50be28dbd0e803419da3d61aa
SHA256caf7a144bc43684c5ecca9ae485847cdb404ae87d707ab4fe933f0abcc264c5e
SHA5120ea259cd56572898557f895ca567f190d31ca98f17c9c89317fb3e54166166341e167a6731ffb68953548c7f99e1caa3d4e511f6feb4ac0b94fb7412d8ebdc32