Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    188s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 03:35

General

  • Target

    5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538.exe

  • Size

    500KB

  • MD5

    2be1cf5946f892873da6d9b75fa28125

  • SHA1

    0ca577b62f98d95c5dff92787a1d483fdbafb100

  • SHA256

    5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538

  • SHA512

    2ca0607efcc40d91fabc4336e79860a0faf643dff75683e4a2a87ce2d4c37e4f43a8684f4443033e07387d08521d2ebc8c22ac5e979387537e51c9478af7af1e

  • SSDEEP

    12288:iPnTu/MkZh2wWzVl1Uq0ijwUywBdvJFrHNcHGu3hWZOIc8:QpTzjuqumrKGu3P

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538.exe
    "C:\Users\Admin\AppData\Local\Temp\5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Roaming\Tool Bug Súng Pr.exe
      "C:\Users\Admin\AppData\Roaming\Tool Bug Súng Pr.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Tool Bug Súng Pr.exe

    Filesize

    290KB

    MD5

    99e6487de4fcdce48886fa0672ed41fa

    SHA1

    21f27144ea4073806b1969d687fa0361931548b3

    SHA256

    ff4d5b616067e6ffedfdcd74395e8d455ea3c3110dcf1b7c80cb3b7755be7163

    SHA512

    e992f76830eb0a43b97ca51a567f57c513e7d57e1511e14e8f47f78b2e0e7394fd908371c71d20fc72f0851cd2feb731261c01b5f90e71ad5eaf249c1b085409

  • C:\Users\Admin\AppData\Roaming\Tool Bug Súng Pr.exe

    Filesize

    290KB

    MD5

    99e6487de4fcdce48886fa0672ed41fa

    SHA1

    21f27144ea4073806b1969d687fa0361931548b3

    SHA256

    ff4d5b616067e6ffedfdcd74395e8d455ea3c3110dcf1b7c80cb3b7755be7163

    SHA512

    e992f76830eb0a43b97ca51a567f57c513e7d57e1511e14e8f47f78b2e0e7394fd908371c71d20fc72f0851cd2feb731261c01b5f90e71ad5eaf249c1b085409

  • memory/1284-132-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/1284-137-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-136-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2112-138-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB