Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    185s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 15:17

General

  • Target

    7434eb532f8c3f05cf62a84aaedb3390087182185d6af5dff3d573860cf2e953.exe

  • Size

    196KB

  • MD5

    96235112d9b87ce6504649893603f74e

  • SHA1

    3a74ca5411be4430aa6fd9f6d100684b498b46d7

  • SHA256

    7434eb532f8c3f05cf62a84aaedb3390087182185d6af5dff3d573860cf2e953

  • SHA512

    b4cd1da0d9e43817ec1516ebd57ddcf38cfb7428595967167bd94d849375c666b35802bf943fe5e42e28e166c81ed26c318e167927418a91a65af2a0bdbf5a67

  • SSDEEP

    6144:W3alGHqU6Pr7FXlbWc3PuV/rvGXUf39GZjJ21OhCJiviq2YWDppQ7J:W3+Pr7FXlbWc3PuV/r+XUf39GZjJ21Oe

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7434eb532f8c3f05cf62a84aaedb3390087182185d6af5dff3d573860cf2e953.exe
    "C:\Users\Admin\AppData\Local\Temp\7434eb532f8c3f05cf62a84aaedb3390087182185d6af5dff3d573860cf2e953.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Users\Admin\guimew.exe
      "C:\Users\Admin\guimew.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\guimew.exe

    Filesize

    196KB

    MD5

    7ac9c8c49a25cb8173b4bb1cb12d287f

    SHA1

    27481b1dc371f24546f318e2615acb03fc16221b

    SHA256

    0999f2d7a3c1f86bb42973e47dd829a63d129b5817224d1f55c17479a8bb094e

    SHA512

    cf7067661dbf4e1c22c806ff0b7b302ddcb0f7df6d617efe536b4f5371aade1fe2c00d1dedc43bad105c0af514f0499893720bb6efe6a1ae32691e4aa7be495b

  • C:\Users\Admin\guimew.exe

    Filesize

    196KB

    MD5

    7ac9c8c49a25cb8173b4bb1cb12d287f

    SHA1

    27481b1dc371f24546f318e2615acb03fc16221b

    SHA256

    0999f2d7a3c1f86bb42973e47dd829a63d129b5817224d1f55c17479a8bb094e

    SHA512

    cf7067661dbf4e1c22c806ff0b7b302ddcb0f7df6d617efe536b4f5371aade1fe2c00d1dedc43bad105c0af514f0499893720bb6efe6a1ae32691e4aa7be495b