Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2022, 03:30

General

  • Target

    d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe

  • Size

    348KB

  • MD5

    2287ea0569ff4c181a0050da1a33595b

  • SHA1

    89eb589364d84823cd0cab91e7251eadec97e8e7

  • SHA256

    d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3

  • SHA512

    e0614cde0270bcb2661993e216d6f9c5ce0454b49b170d415e7e167335a0ff9510f121dc97d28b040828b36c50ca95aaf574ea963e5457c8c799d4af5bb89f3f

  • SSDEEP

    3072:ECXTo/0Yxyk0tQ9nLHbB9WPliBs2HWWEakGJm9cFso:ECusk4QxL7B9WPli+yWWEazH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
    "C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Users\Admin\peauv.exe
      "C:\Users\Admin\peauv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\peauv.exe

    Filesize

    348KB

    MD5

    7ca2b4aef4498a12a2c448aa5ea2bf6f

    SHA1

    bf838ba029fd246fd3ed49be27ec90c9f20e44ce

    SHA256

    c222d783c2b730e91deac82940a80091db540ff74784e0abc3b957a86140a9ab

    SHA512

    52471c054516efe1ca9b96b12d5c7a9c4168a2b9ae8e417c0de6f46b3441b275ab5eac4203cdf9e249fcaada5a88a93803c10ffbc797e11f21eeb5ac69025992

  • C:\Users\Admin\peauv.exe

    Filesize

    348KB

    MD5

    7ca2b4aef4498a12a2c448aa5ea2bf6f

    SHA1

    bf838ba029fd246fd3ed49be27ec90c9f20e44ce

    SHA256

    c222d783c2b730e91deac82940a80091db540ff74784e0abc3b957a86140a9ab

    SHA512

    52471c054516efe1ca9b96b12d5c7a9c4168a2b9ae8e417c0de6f46b3441b275ab5eac4203cdf9e249fcaada5a88a93803c10ffbc797e11f21eeb5ac69025992

  • memory/1156-134-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/1156-141-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2492-138-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2492-142-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB