Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe
Resource
win10v2004-20220812-en
General
-
Target
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe
-
Size
76KB
-
MD5
6b45e97402c483b4aca61f3f70f26848
-
SHA1
40199f38a00da11048d10afba26f953b782a403a
-
SHA256
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874
-
SHA512
ee0e4496368fcd48618eef17b6c2f9234db12fc91188e346490331df1f9a9070d2da3aabae6f2f5c49049a30e38ae7228a1056168ce32e8b8ca73a7baa67919e
-
SSDEEP
1536:xidlOpARzc+o3Kef6b4BnnjmNHp0HHJazt+ZeR9:MdguxfbknywHHJaRB9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3840 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3840 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3156 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3600 3156 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe 89 PID 3156 wrote to memory of 3600 3156 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe 89 PID 3156 wrote to memory of 3600 3156 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe 89 PID 3600 wrote to memory of 3840 3600 cmd.exe 92 PID 3600 wrote to memory of 3840 3600 cmd.exe 92 PID 3600 wrote to memory of 3840 3600 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe"C:\Users\Admin\AppData\Local\Temp\b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-