Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe
Resource
win10v2004-20220901-en
General
-
Target
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe
-
Size
629KB
-
MD5
450060ccd8b9d7d412c94d95633543e1
-
SHA1
7e1c2de473b6d376799651f14280f4f8ad3ce8fb
-
SHA256
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
-
SHA512
4603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
SSDEEP
12288:2N+LbOurqW8AuLexBtRDgNCrrxHeGCcOHO:FOurqW8AuL8fD4CrrsGCcaO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3176 explorer.exe 1328 explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\explorer.exe" explorer.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\W: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\Y: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\K: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\V: explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2276 set thread context of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 3176 set thread context of 1328 3176 explorer.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 3176 explorer.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 2276 wrote to memory of 64 2276 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 84 PID 64 wrote to memory of 3176 64 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 86 PID 64 wrote to memory of 3176 64 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 86 PID 64 wrote to memory of 3176 64 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 86 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87 PID 3176 wrote to memory of 1328 3176 explorer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
PID:1328
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b