Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe
Resource
win10v2004-20220901-en
General
-
Target
968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe
-
Size
126KB
-
MD5
74a5c7e6ea938324e05d0c0e64b09fb0
-
SHA1
99f25305bb571300c7621d5e92dd195a0c9d1cf2
-
SHA256
968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380
-
SHA512
29f315b007e894f6733d098a8b8e475b41069dd4bb36e4489b836ea5417a374b43ddcf4f86761618d6211a3a3bd2132002645a794a520c30f19152460e7e407b
-
SSDEEP
1536:GQV6ZVHYt11f3F+p4f3T4Bonhn/CrrrlX8+wfyYc3QuF/H3gytusDQv3gyOKqHZB:GQsZVHYt11fRkbYGQuFvV2WPKIFiMGU
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Internet Explorer.lnk 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\windd32_tys = "C:\\Program Files\\Windows Publys\\services.exe" regedit.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\internat.exe.txt 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe File opened for modification C:\Windows\SysWOW64\internat.exe 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe File opened for modification C:\Windows\SysWOW64\2.txt 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe File created C:\Windows\SysWOW64\1.txt 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe File opened for modification C:\Windows\SysWOW64\1.txt 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Publys\services.exe.txt 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe File opened for modification C:\Program Files\Windows Publys\services.exe 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\Windows Publys\services.exe.txt 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe File opened for modification C:\WINDOWS\Windows Publys\services.exe 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1940 regedit.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 3988 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 3988 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 3988 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3988 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 84 PID 1736 wrote to memory of 3988 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 84 PID 1736 wrote to memory of 3988 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 84 PID 1736 wrote to memory of 1940 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 93 PID 1736 wrote to memory of 1940 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 93 PID 1736 wrote to memory of 1940 1736 968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe"C:\Users\Admin\AppData\Local\Temp\968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exeC:\Users\Admin\AppData\Local\Temp\968dac9bd77fcf56ee14aafc9e190c8911f152d9acb36f183e2923d37ad66380.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:3988
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\1.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171B
MD5f98bd04887bf4e30b5d861cb88c49e77
SHA11e60d2bdec5bf612f8c7ff97912eb2c995dc5288
SHA2568f7ada98a21252402910c4900f9462a8d17b20d913440e3ae48dbfd8cf8b6ddc
SHA512afd0db19431112ebe5f9adda5fbfb6992fa8d363465f133d8f5798957d86ed1e2d2dbf13a6bd05f4cc32db46d9884df5861551c0174265ff1b547ff37e02f978