Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
167s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 19:25
Behavioral task
behavioral1
Sample
96c394b741b7451872c658be5aa1283d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96c394b741b7451872c658be5aa1283d.exe
Resource
win10v2004-20220812-en
General
-
Target
96c394b741b7451872c658be5aa1283d.exe
-
Size
73KB
-
MD5
96c394b741b7451872c658be5aa1283d
-
SHA1
b00a0c4073a1192e8061c11521f00a167ba76df7
-
SHA256
34a76a64e1a7a96c82f37c25c3861cb959584497e3d4bf8344ea7468a1b925a8
-
SHA512
3d777d58b44518a08c77ddc366821fc4d7906f4b6c68bd794328a1fc0a47a895785ce47b97eee74de617cf0ba358546b1f3a4875907b60446b5f60c798674400
-
SSDEEP
1536:JgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:JMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 96c394b741b7451872c658be5aa1283d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\erbgcgenifg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96c394b741b7451872c658be5aa1283d.exe" 96c394b741b7451872c658be5aa1283d.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\M: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\N: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\O: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\R: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\V: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\B: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\T: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\Y: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\Z: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\X: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\H: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\I: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\K: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\P: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\Q: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\W: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\U: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\A: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\E: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\F: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\G: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\J: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\S: 96c394b741b7451872c658be5aa1283d.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 96c394b741b7451872c658be5aa1283d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 96c394b741b7451872c658be5aa1283d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 96c394b741b7451872c658be5aa1283d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4832 96c394b741b7451872c658be5aa1283d.exe 4832 96c394b741b7451872c658be5aa1283d.exe 4832 96c394b741b7451872c658be5aa1283d.exe 4832 96c394b741b7451872c658be5aa1283d.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4976 4832 96c394b741b7451872c658be5aa1283d.exe 82 PID 4832 wrote to memory of 4976 4832 96c394b741b7451872c658be5aa1283d.exe 82 PID 4832 wrote to memory of 4976 4832 96c394b741b7451872c658be5aa1283d.exe 82 PID 4832 wrote to memory of 4408 4832 96c394b741b7451872c658be5aa1283d.exe 85 PID 4832 wrote to memory of 4408 4832 96c394b741b7451872c658be5aa1283d.exe 85 PID 4832 wrote to memory of 4408 4832 96c394b741b7451872c658be5aa1283d.exe 85 PID 4832 wrote to memory of 4312 4832 96c394b741b7451872c658be5aa1283d.exe 90 PID 4832 wrote to memory of 4312 4832 96c394b741b7451872c658be5aa1283d.exe 90 PID 4832 wrote to memory of 4312 4832 96c394b741b7451872c658be5aa1283d.exe 90 PID 4832 wrote to memory of 2816 4832 96c394b741b7451872c658be5aa1283d.exe 93 PID 4832 wrote to memory of 2816 4832 96c394b741b7451872c658be5aa1283d.exe 93 PID 4832 wrote to memory of 2816 4832 96c394b741b7451872c658be5aa1283d.exe 93 PID 4832 wrote to memory of 4996 4832 96c394b741b7451872c658be5aa1283d.exe 95 PID 4832 wrote to memory of 4996 4832 96c394b741b7451872c658be5aa1283d.exe 95 PID 4832 wrote to memory of 4996 4832 96c394b741b7451872c658be5aa1283d.exe 95 PID 4832 wrote to memory of 2788 4832 96c394b741b7451872c658be5aa1283d.exe 99 PID 4832 wrote to memory of 2788 4832 96c394b741b7451872c658be5aa1283d.exe 99 PID 4832 wrote to memory of 2788 4832 96c394b741b7451872c658be5aa1283d.exe 99 PID 4832 wrote to memory of 4280 4832 96c394b741b7451872c658be5aa1283d.exe 101 PID 4832 wrote to memory of 4280 4832 96c394b741b7451872c658be5aa1283d.exe 101 PID 4832 wrote to memory of 4280 4832 96c394b741b7451872c658be5aa1283d.exe 101 PID 4832 wrote to memory of 2576 4832 96c394b741b7451872c658be5aa1283d.exe 103 PID 4832 wrote to memory of 2576 4832 96c394b741b7451872c658be5aa1283d.exe 103 PID 4832 wrote to memory of 2576 4832 96c394b741b7451872c658be5aa1283d.exe 103 PID 4832 wrote to memory of 5044 4832 96c394b741b7451872c658be5aa1283d.exe 105 PID 4832 wrote to memory of 5044 4832 96c394b741b7451872c658be5aa1283d.exe 105 PID 4832 wrote to memory of 5044 4832 96c394b741b7451872c658be5aa1283d.exe 105 PID 4832 wrote to memory of 3320 4832 96c394b741b7451872c658be5aa1283d.exe 107 PID 4832 wrote to memory of 3320 4832 96c394b741b7451872c658be5aa1283d.exe 107 PID 4832 wrote to memory of 3320 4832 96c394b741b7451872c658be5aa1283d.exe 107 PID 4832 wrote to memory of 2052 4832 96c394b741b7451872c658be5aa1283d.exe 109 PID 4832 wrote to memory of 2052 4832 96c394b741b7451872c658be5aa1283d.exe 109 PID 4832 wrote to memory of 2052 4832 96c394b741b7451872c658be5aa1283d.exe 109 PID 4832 wrote to memory of 3376 4832 96c394b741b7451872c658be5aa1283d.exe 111 PID 4832 wrote to memory of 3376 4832 96c394b741b7451872c658be5aa1283d.exe 111 PID 4832 wrote to memory of 3376 4832 96c394b741b7451872c658be5aa1283d.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\96c394b741b7451872c658be5aa1283d.exe"C:\Users\Admin\AppData\Local\Temp\96c394b741b7451872c658be5aa1283d.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4976
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4408
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4312
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4996
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2788
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4280
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2576
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:5044
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2052
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3376
-