Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2022, 14:07
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20220812-en
General
-
Target
1.exe
-
Size
211KB
-
MD5
298dcc1285045bc397ef95ec583901da
-
SHA1
0b983d8948b282a76bece44d61e9ac73f10cfd31
-
SHA256
56871e1fe3b6af154aadd2ab300f0bfc031aea4fab992dbaec57057459a0d754
-
SHA512
ef296ab179f5578d51ccbbe6b9194e1bd3fd46affa3a14be955e15994b6e902c01b467a962eb0d3548fe510f16c77c73d87bece92b15bc6f89c3e2dd4ffea94a
-
SSDEEP
6144:gia1gMHOPDWIhID8X/4DQFu/U3buRKlemZ9DnGAetTsB+U+:gIMH06cID84DQFu/U3buRKlemZ9DnGAI
Malware Config
Signatures
-
Detects Zeppelin payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000022f42-133.dat family_zeppelin behavioral2/files/0x000c000000022f42-134.dat family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Executes dropped EXE 1 IoCs
pid Process 3976 smss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\smss.exe\" -start" 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2156 3976 WerFault.exe 77 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1996 1.exe Token: SeDebugPrivilege 1996 1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3976 1996 1.exe 77 PID 1996 wrote to memory of 3976 1996 1.exe 77 PID 1996 wrote to memory of 3976 1996 1.exe 77 PID 1996 wrote to memory of 4212 1996 1.exe 78 PID 1996 wrote to memory of 4212 1996 1.exe 78 PID 1996 wrote to memory of 4212 1996 1.exe 78 PID 1996 wrote to memory of 4212 1996 1.exe 78 PID 1996 wrote to memory of 4212 1996 1.exe 78 PID 1996 wrote to memory of 4212 1996 1.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start2⤵
- Executes dropped EXE
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 6683⤵
- Program crash
PID:2156
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3976 -ip 39761⤵PID:4272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5298dcc1285045bc397ef95ec583901da
SHA10b983d8948b282a76bece44d61e9ac73f10cfd31
SHA25656871e1fe3b6af154aadd2ab300f0bfc031aea4fab992dbaec57057459a0d754
SHA512ef296ab179f5578d51ccbbe6b9194e1bd3fd46affa3a14be955e15994b6e902c01b467a962eb0d3548fe510f16c77c73d87bece92b15bc6f89c3e2dd4ffea94a
-
Filesize
211KB
MD5298dcc1285045bc397ef95ec583901da
SHA10b983d8948b282a76bece44d61e9ac73f10cfd31
SHA25656871e1fe3b6af154aadd2ab300f0bfc031aea4fab992dbaec57057459a0d754
SHA512ef296ab179f5578d51ccbbe6b9194e1bd3fd46affa3a14be955e15994b6e902c01b467a962eb0d3548fe510f16c77c73d87bece92b15bc6f89c3e2dd4ffea94a