Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 16:20

General

  • Target

    dd97cc02fd7bc24bbfe09f78c106c3956aeb33c809c50493bac30fe10edf23d6.exe

  • Size

    148KB

  • MD5

    568f69c305e5443d2fc3d90105ec2231

  • SHA1

    42f05cd9ea7c7945a05afdebfb6b161a706cb615

  • SHA256

    dd97cc02fd7bc24bbfe09f78c106c3956aeb33c809c50493bac30fe10edf23d6

  • SHA512

    28e7b7f00f5fd995856148ec9678fdfc01dec4f5e4b5626516f9b8d01af7ef6bbd2e644050b675f478c9d25f154c138d2e22bcdf90964190d7c0dfed8f5c4bf5

  • SSDEEP

    1536:po9LCOf4BlqPAK1lxnX+PBcRlouQvSPouXZ6D6Jj5wl+dwCMZUbP7X2YhxYAZxZb:G4KalqPpR+Pco6ouZ68Kl+dnMZUbxd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd97cc02fd7bc24bbfe09f78c106c3956aeb33c809c50493bac30fe10edf23d6.exe
    "C:\Users\Admin\AppData\Local\Temp\dd97cc02fd7bc24bbfe09f78c106c3956aeb33c809c50493bac30fe10edf23d6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\toago.exe
      "C:\Users\Admin\toago.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\toago.exe

    Filesize

    148KB

    MD5

    d32d67e5132c6e5ff9bb34b3825a281c

    SHA1

    ad25b3a27c48572be006d678b07f949c5b000c2c

    SHA256

    1b39c90e815987435c69fc36ecd0b6c3afd576a957bedabde5fde3f221bf6344

    SHA512

    f2a7224b0091fb6253600b74757447cce549c647b8631d89c577d7430a5e1c3c659c1c47365f5c3c20c529b31cf70975542eee1a6a45584948caac92a01ed5df

  • C:\Users\Admin\toago.exe

    Filesize

    148KB

    MD5

    d32d67e5132c6e5ff9bb34b3825a281c

    SHA1

    ad25b3a27c48572be006d678b07f949c5b000c2c

    SHA256

    1b39c90e815987435c69fc36ecd0b6c3afd576a957bedabde5fde3f221bf6344

    SHA512

    f2a7224b0091fb6253600b74757447cce549c647b8631d89c577d7430a5e1c3c659c1c47365f5c3c20c529b31cf70975542eee1a6a45584948caac92a01ed5df