Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe
Resource
win10v2004-20220901-en
General
-
Target
faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe
-
Size
108KB
-
MD5
41ad87ab3d21f78ced48d85f78215bf0
-
SHA1
28f53d571ee58c15a552c0b93ed35a8ca91c17bb
-
SHA256
faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb
-
SHA512
46f4d786a797ad1f725df5c713dc292e8a3c9242c4621a7a0945f2e43f95f28bd34b5fd95625c6d8600b2e2495bc50510b5081d1c92a615c735ea2dda6da8e1c
-
SSDEEP
1536:rnRVqAJCUHjyz+Ug5Tncp4HjBobaMyOqXkV5fxTiQqAF8WG71q:X30UHvUgNcCHjBoba0V5ZTiQqR71
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 936 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 936 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 816 faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 816 wrote to memory of 1652 816 faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe 85 PID 816 wrote to memory of 1652 816 faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe 85 PID 816 wrote to memory of 1652 816 faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe 85 PID 1652 wrote to memory of 936 1652 cmd.exe 87 PID 1652 wrote to memory of 936 1652 cmd.exe 87 PID 1652 wrote to memory of 936 1652 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe"C:\Users\Admin\AppData\Local\Temp\faf5fef0bdb57c856288fc52b17450527735e0973f431eb0cb9658f68475e1fb.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del faf5fef0bdb57c856288fc52b1745052772⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-