Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07/10/2022, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe
Resource
win10-20220901-en
General
-
Target
b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe
-
Size
1.4MB
-
MD5
8ed84d51ecf9da4547d393b0692853ee
-
SHA1
7918c94094a0e47583fc08ee050be78d1bf319d3
-
SHA256
b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185
-
SHA512
7868389075517c529ad3701545b005ddc04b8867aa986d105162eb42f4f6aa5e49f1205b285b5af66519e2bcc2355e9d3e751858072f8c8fe957d37ba57a42a8
-
SSDEEP
24576:I/XEXjJSFHUKmIWioFTrJmSf3aq6jhWaX+5BSc6lWafmNDTekz:I/oSmBCq6dWaEUc6sbDTt
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3424 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1304 wrote to memory of 3572 1304 b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe 66 PID 1304 wrote to memory of 3572 1304 b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe 66 PID 1304 wrote to memory of 3572 1304 b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe 66 PID 3572 wrote to memory of 3424 3572 control.exe 68 PID 3572 wrote to memory of 3424 3572 control.exe 68 PID 3572 wrote to memory of 3424 3572 control.exe 68 PID 3424 wrote to memory of 3992 3424 rundll32.exe 69 PID 3424 wrote to memory of 3992 3424 rundll32.exe 69 PID 3992 wrote to memory of 2288 3992 RunDll32.exe 70 PID 3992 wrote to memory of 2288 3992 RunDll32.exe 70 PID 3992 wrote to memory of 2288 3992 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe"C:\Users\Admin\AppData\Local\Temp\b1f307455db3f8e39db0e14f75aab8b47b53f2510b8c037ed798f8431c945185.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\CVy2BKEN.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\CVy2BKEN.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\CVy2BKEN.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\CVy2BKEN.cpl",5⤵
- Loads dropped DLL
PID:2288
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD53f28ad70ea3ee18632614bac76864dc8
SHA15b3c0fcafb185648ebab13d8db077f6c70351fd7
SHA256040b7cd4db33f85275165cf9b898f50734f70c7e03bfe5d34b78896f16ef2454
SHA512a1ec70a9dd6138a961ce23a66e522a1a933652d379ded5ac925ffd27b775deacd288ebc060db622b799f0ce3461b53722130158146d8dc7ed31e1e5f530acdd2
-
Filesize
1.6MB
MD53f28ad70ea3ee18632614bac76864dc8
SHA15b3c0fcafb185648ebab13d8db077f6c70351fd7
SHA256040b7cd4db33f85275165cf9b898f50734f70c7e03bfe5d34b78896f16ef2454
SHA512a1ec70a9dd6138a961ce23a66e522a1a933652d379ded5ac925ffd27b775deacd288ebc060db622b799f0ce3461b53722130158146d8dc7ed31e1e5f530acdd2
-
Filesize
1.6MB
MD53f28ad70ea3ee18632614bac76864dc8
SHA15b3c0fcafb185648ebab13d8db077f6c70351fd7
SHA256040b7cd4db33f85275165cf9b898f50734f70c7e03bfe5d34b78896f16ef2454
SHA512a1ec70a9dd6138a961ce23a66e522a1a933652d379ded5ac925ffd27b775deacd288ebc060db622b799f0ce3461b53722130158146d8dc7ed31e1e5f530acdd2
-
Filesize
1.6MB
MD53f28ad70ea3ee18632614bac76864dc8
SHA15b3c0fcafb185648ebab13d8db077f6c70351fd7
SHA256040b7cd4db33f85275165cf9b898f50734f70c7e03bfe5d34b78896f16ef2454
SHA512a1ec70a9dd6138a961ce23a66e522a1a933652d379ded5ac925ffd27b775deacd288ebc060db622b799f0ce3461b53722130158146d8dc7ed31e1e5f530acdd2