Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe
Resource
win10v2004-20220812-en
General
-
Target
a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe
-
Size
392KB
-
MD5
90bbd08a32bbb6f857921c5fdce88400
-
SHA1
604a969183d18d2e5b285746576110acfedfa263
-
SHA256
a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140
-
SHA512
174712a4303d0dcf1d1b77e2e08ff978c23b11f82ac1f83e7550f3d12f666ed427c0b843c987ae22002eae34f09de9a5891eaac0a175e2fd7964783d7062e600
-
SSDEEP
12288:Ct8vVED3Bk0Mr9Vif7/F1hIIaYHuvAIS2r:Ct+gvMpVij/F1hV5HuvAIR
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 5064 achsv.exe 4988 COM7.EXE 408 COM7.EXE 4208 achsv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation COM7.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PDF FoxitReader.exe COM7.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COMLOADER = "\\\\.\\C:\\Program Files\\FoxitReader\\bin\\COM7.EXE" reg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\FoxitReader\bin\COM7.EXE COM7.EXE File created C:\Program Files\FoxitReader\FoxitReader.exe COM7.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4536 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 5064 achsv.exe 5064 achsv.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 408 COM7.EXE 408 COM7.EXE 4208 achsv.exe 4208 achsv.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 4988 COM7.EXE 4988 COM7.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5064 achsv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1932 wrote to memory of 5064 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 81 PID 1932 wrote to memory of 5064 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 81 PID 1932 wrote to memory of 5064 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 81 PID 1932 wrote to memory of 4988 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 82 PID 1932 wrote to memory of 4988 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 82 PID 1932 wrote to memory of 4988 1932 a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe 82 PID 4988 wrote to memory of 4536 4988 COM7.EXE 83 PID 4988 wrote to memory of 4536 4988 COM7.EXE 83 PID 4988 wrote to memory of 4536 4988 COM7.EXE 83 PID 5064 wrote to memory of 408 5064 achsv.exe 85 PID 5064 wrote to memory of 408 5064 achsv.exe 85 PID 5064 wrote to memory of 408 5064 achsv.exe 85 PID 4988 wrote to memory of 4208 4988 COM7.EXE 86 PID 4988 wrote to memory of 4208 4988 COM7.EXE 86 PID 4988 wrote to memory of 4208 4988 COM7.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe"C:\Users\Admin\AppData\Local\Temp\a6a996e6ed5a5760ad3120b2f9d2e3697386742ebd9a7e8ebf57f47b2ecb0140.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COMLOADER /d "\\.\C:\Program Files\FoxitReader\bin\COM7.EXE"3⤵
- Adds Run key to start application
- Modifies registry key
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5ae82f21e7d23a9543fceeb860a6cbf30
SHA17b7b3c2cc2efac3aeda3b6a886c3d3839babba4f
SHA25620c42ec194acbdec19f23f589924af04366f7821ae253dfe42f5b6b74424da1b
SHA5127d7b57f71133fe8ce061270dd8b137f5d7aa7f7c19f35838db87bbf493998424755800eb4d7a0707c653b913151a1ccf86371ef00e0762e807d576b4a1ef5f2c
-
Filesize
392KB
MD5ae82f21e7d23a9543fceeb860a6cbf30
SHA17b7b3c2cc2efac3aeda3b6a886c3d3839babba4f
SHA25620c42ec194acbdec19f23f589924af04366f7821ae253dfe42f5b6b74424da1b
SHA5127d7b57f71133fe8ce061270dd8b137f5d7aa7f7c19f35838db87bbf493998424755800eb4d7a0707c653b913151a1ccf86371ef00e0762e807d576b4a1ef5f2c
-
Filesize
392KB
MD5ae82f21e7d23a9543fceeb860a6cbf30
SHA17b7b3c2cc2efac3aeda3b6a886c3d3839babba4f
SHA25620c42ec194acbdec19f23f589924af04366f7821ae253dfe42f5b6b74424da1b
SHA5127d7b57f71133fe8ce061270dd8b137f5d7aa7f7c19f35838db87bbf493998424755800eb4d7a0707c653b913151a1ccf86371ef00e0762e807d576b4a1ef5f2c
-
Filesize
392KB
MD5a1d6f04f4c5996de7426d2e142073ed8
SHA13734028be43623668cba874e6bce9f42a0cf651c
SHA25684a09db74efc90489e5febd147f7d2d649759e5b2648e8b176a668c42fc2e100
SHA51249129c987bb2efd0879ad326e038176450934de7b154e1e43bd658741f71d4993467fe9f449ac5a78ac993ec0aba9919384c7ecc75d51c50e436538d2e22b922
-
Filesize
392KB
MD5a1d6f04f4c5996de7426d2e142073ed8
SHA13734028be43623668cba874e6bce9f42a0cf651c
SHA25684a09db74efc90489e5febd147f7d2d649759e5b2648e8b176a668c42fc2e100
SHA51249129c987bb2efd0879ad326e038176450934de7b154e1e43bd658741f71d4993467fe9f449ac5a78ac993ec0aba9919384c7ecc75d51c50e436538d2e22b922
-
Filesize
392KB
MD5a1d6f04f4c5996de7426d2e142073ed8
SHA13734028be43623668cba874e6bce9f42a0cf651c
SHA25684a09db74efc90489e5febd147f7d2d649759e5b2648e8b176a668c42fc2e100
SHA51249129c987bb2efd0879ad326e038176450934de7b154e1e43bd658741f71d4993467fe9f449ac5a78ac993ec0aba9919384c7ecc75d51c50e436538d2e22b922