Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 06:34

General

  • Target

    6a07a50a8246f502cc6130118fff6d79904e0bf4da52908cf24163e438c9133e.exe

  • Size

    80KB

  • MD5

    627dd49873ed6be09a82af987a00cbb0

  • SHA1

    bbcf3805374046a6d14c62e1b27056ab950a02f9

  • SHA256

    6a07a50a8246f502cc6130118fff6d79904e0bf4da52908cf24163e438c9133e

  • SHA512

    893336c000dc7ae0e0d35dc91aea68b901cdf5d06c7d21ab728e0e6017855bac6397c22a47c68f6d4bd0c7e8713661a065df9f7ca4afbcf6df4f305ed865cfb2

  • SSDEEP

    1536:TW7wLCvKGlTGQxguIxZTATocTzFJ0T72Vpkc:aoCvrKxZ8BTzFJ0T72wc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a07a50a8246f502cc6130118fff6d79904e0bf4da52908cf24163e438c9133e.exe
    "C:\Users\Admin\AppData\Local\Temp\6a07a50a8246f502cc6130118fff6d79904e0bf4da52908cf24163e438c9133e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\gaeede.exe
      "C:\Users\Admin\gaeede.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gaeede.exe

    Filesize

    80KB

    MD5

    e017353b5f64b0694ca41fb20e24489f

    SHA1

    9b445a2eeec0ad04051dfc4361fd053fb6dce2f1

    SHA256

    d1d3bc3430c8333508dee08c3523d04ad7f1a8d28f8a7a1261bb166645a475a1

    SHA512

    22b03e60f5794f73f0a9aba61fac7e917996fa1c828d9e8915c03300361d55dd27b8eb71c4594fc7c42915446d4f419853269754890b4402225434e0c65c474a

  • C:\Users\Admin\gaeede.exe

    Filesize

    80KB

    MD5

    e017353b5f64b0694ca41fb20e24489f

    SHA1

    9b445a2eeec0ad04051dfc4361fd053fb6dce2f1

    SHA256

    d1d3bc3430c8333508dee08c3523d04ad7f1a8d28f8a7a1261bb166645a475a1

    SHA512

    22b03e60f5794f73f0a9aba61fac7e917996fa1c828d9e8915c03300361d55dd27b8eb71c4594fc7c42915446d4f419853269754890b4402225434e0c65c474a