Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENTTRF889020022.exe
Resource
win7-20220812-en
General
-
Target
PAYMENTTRF889020022.exe
-
Size
355KB
-
MD5
1d00728cbb02b69a8cad3f032be410c8
-
SHA1
a803d959e77cdbec645288fe922d12e6888a209a
-
SHA256
c3fb8b20af40e3a6905a1190d657bd725c241efa3d91d0c0e1546f2b8ae8a2ff
-
SHA512
8858475d2f17f2f6786cbcd33f64bcb1515c931fd095d7d1828b1765dca3d47e454ef961c3ce4e41c9087494530694ede7475c8f31d4d549a9b2d913cc5d7257
-
SSDEEP
6144:HNeZmLE2rXehVTdEMLjtEkzKJg5/mnc52iOu0anAU5hvrBAVGFryDgvMar819nYk:HNl9KhVTtLjmkzufc5D0aBvrXVkgzr85
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2184 bglfezp.exe -
Loads dropped DLL 1 IoCs
pid Process 4548 bglfezp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bglfezp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2184 set thread context of 4548 2184 bglfezp.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3024 2184 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4548 bglfezp.exe 4548 bglfezp.exe 4548 bglfezp.exe 4548 bglfezp.exe 4548 bglfezp.exe 4548 bglfezp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4548 bglfezp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4548 bglfezp.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2184 2264 PAYMENTTRF889020022.exe 81 PID 2264 wrote to memory of 2184 2264 PAYMENTTRF889020022.exe 81 PID 2264 wrote to memory of 2184 2264 PAYMENTTRF889020022.exe 81 PID 2184 wrote to memory of 4548 2184 bglfezp.exe 82 PID 2184 wrote to memory of 4548 2184 bglfezp.exe 82 PID 2184 wrote to memory of 4548 2184 bglfezp.exe 82 PID 2184 wrote to memory of 4548 2184 bglfezp.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENTTRF889020022.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENTTRF889020022.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 5603⤵
- Program crash
PID:3024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2184 -ip 21841⤵PID:4860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
280KB
MD54fa4f199d63df6ed8ab5185bd28acef5
SHA18021bc2518851cd10202c3923a6de177c830d09f
SHA25603062221476d82fd59234117006236c4d88bc247c5b38894393c28caba795399
SHA51284d2a9021282d702cc951819c886c6dd8db4cad2ae8b5a3b609c64af6a1e2b5c3643c68e3bcad7a49db8a364e83626ea5867614e81c45e37fcc3be511e06f30a
-
Filesize
4KB
MD51a8c85947e15b903b353a69704452e22
SHA193941b1e770b673698b1ae338156d16257d94db4
SHA25606f20357f36314fb82d550011bdbbdef7e9ce4ceac791c133e537cafe3b62c83
SHA512b9ae1d779e8e2ff999073477765df2bf665219e670d250727c6177de039ff7cef800f9590084dd5d1d1bc02cad3895ea9e9f2b6068229a755ef8609e3e022318