Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe
Resource
win10v2004-20220901-en
General
-
Target
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe
-
Size
248KB
-
MD5
9247ad13749929716a66eda778c88540
-
SHA1
67a20e6651841a5e0067a2ce6b925df9b4060cc4
-
SHA256
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b
-
SHA512
22afaaa99d181a913449a37f4d1cef8e84b78420b844a2ec466da22f05bf2dfb1ba76fbfede3439934fbef1c8be1fb11cff367d2f9f6a59866ad525416f96ace
-
SSDEEP
1536:BHdzhnsTe/Koejg1bykBiMTKWNkTXCoSGbFtBu8cP/a6zm8jeR2qeBgsetxAA27n:ldzRsirqgAkbKW0rbFDSy0tVVet6A2Q2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4664 killa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\killa.exe 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe File created C:\Windows\killa.exe 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4664 4280 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe 85 PID 4280 wrote to memory of 4664 4280 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe 85 PID 4280 wrote to memory of 4664 4280 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe"C:\Users\Admin\AppData\Local\Temp\45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\killa.exe"C:\Windows\killa.exe" 2C:\Users\Admin\AppData\Local\Temp\45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe2⤵
- Executes dropped EXE
PID:4664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD59247ad13749929716a66eda778c88540
SHA167a20e6651841a5e0067a2ce6b925df9b4060cc4
SHA25645422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b
SHA51222afaaa99d181a913449a37f4d1cef8e84b78420b844a2ec466da22f05bf2dfb1ba76fbfede3439934fbef1c8be1fb11cff367d2f9f6a59866ad525416f96ace
-
Filesize
248KB
MD59247ad13749929716a66eda778c88540
SHA167a20e6651841a5e0067a2ce6b925df9b4060cc4
SHA25645422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b
SHA51222afaaa99d181a913449a37f4d1cef8e84b78420b844a2ec466da22f05bf2dfb1ba76fbfede3439934fbef1c8be1fb11cff367d2f9f6a59866ad525416f96ace