Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe
Resource
win10v2004-20220901-en
General
-
Target
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe
-
Size
48KB
-
MD5
a1a7f36c3b0d7ad6218456fe6541d050
-
SHA1
b2e033a6d29ade282feba036dcd6cf3d15c9fb34
-
SHA256
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a
-
SHA512
6b75257be9b975ca403e0ee25136d0af0ca24890edca14acdc39ac98da29f46b023586194d1bd9e9fa539fcd3ee76ebf357047e0c457c84cc9e1248975468506
-
SSDEEP
768:2C1JqcBnOR7NTgb2UHtaZH6yDC9VavyOAVx8:2CFKVgBqCWvDox8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2084 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1300 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2156 1300 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe 85 PID 1300 wrote to memory of 2156 1300 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe 85 PID 1300 wrote to memory of 2156 1300 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe 85 PID 2156 wrote to memory of 2084 2156 cmd.exe 87 PID 2156 wrote to memory of 2084 2156 cmd.exe 87 PID 2156 wrote to memory of 2084 2156 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe"C:\Users\Admin\AppData\Local\Temp\4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-