Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 04:30

General

  • Target

    eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe

  • Size

    36KB

  • MD5

    5714cbdcc9fcc0902078e3e00f6f8318

  • SHA1

    b7c46bc7ae6b6d2ca61ab4172bf106f0a3a42480

  • SHA256

    eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104

  • SHA512

    3cf729d8ee5bc668d40ae38490b8939fdb41b0fa579d3d2961969e9f3e68a825bb1bf113495fbcab0271a003fbfcfcb0438ddc20713807f550cc5d5c4ac0e549

  • SSDEEP

    384:fsjcZTurRgiI+pDU68x1kE1h8GImYJMGkvvGd23AcYCthUnFK+RLW7FJDlKNAUCr:1ZTEgiTDUaF4K33CXUFOknm

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe
    "C:\Users\Admin\AppData\Local\Temp\eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\Admin1\winlogon.exe
      "C:\Users\Admin\Admin1\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:3032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Admin1\winlogon.exe

    Filesize

    36KB

    MD5

    5714cbdcc9fcc0902078e3e00f6f8318

    SHA1

    b7c46bc7ae6b6d2ca61ab4172bf106f0a3a42480

    SHA256

    eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104

    SHA512

    3cf729d8ee5bc668d40ae38490b8939fdb41b0fa579d3d2961969e9f3e68a825bb1bf113495fbcab0271a003fbfcfcb0438ddc20713807f550cc5d5c4ac0e549

  • C:\Users\Admin\Admin1\winlogon.exe

    Filesize

    36KB

    MD5

    5714cbdcc9fcc0902078e3e00f6f8318

    SHA1

    b7c46bc7ae6b6d2ca61ab4172bf106f0a3a42480

    SHA256

    eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104

    SHA512

    3cf729d8ee5bc668d40ae38490b8939fdb41b0fa579d3d2961969e9f3e68a825bb1bf113495fbcab0271a003fbfcfcb0438ddc20713807f550cc5d5c4ac0e549

  • memory/3032-140-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3032-142-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4196-132-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4196-141-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB