Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26/10/2022, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe
Resource
win10-20220812-en
General
-
Target
02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe
-
Size
4.6MB
-
MD5
3056792cfe11d96217fa3626f3ab6a5f
-
SHA1
d2b732a35d22e32dbc265957e624c667012a6a18
-
SHA256
02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5
-
SHA512
c7e217193294760af3bfb12ff4e7ed327faf9ba09e05d3927eaba26385ce9853ff42685cdabff00fbe6c1461ce5c772afc7a158d72da9e33039da0ee828789c8
-
SSDEEP
24576:2RlFlAOYfBKbQzW3I+ps4NCmntjDesG5InScdbJaP1tVpVzKGeGCvCr2F1xgLAZ4:
Malware Config
Extracted
bitrat
1.38
gh9st.mywire.org:5005
-
communication_password
803355ca422bf9b37bc523a750e21842
-
install_dir
svcsvc
-
install_file
svcsvc.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\PUTTY = "\"C:\\Users\\Admin\\AppData\\Roaming\\PUTTY.EXE\"" 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svcsvc = "C:\\Users\\Admin\\AppData\\Local\\svcsvc\\svcsvc.exe" 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svcsvc = "C:\\Users\\Admin\\AppData\\Local\\svcsvc\\svcsvc.exe\uf800" 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svcsvc = "C:\\Users\\Admin\\AppData\\Local\\svcsvc\\svcsvc.exe\uff00" 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3844 set thread context of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4272 powershell.exe 4272 powershell.exe 4272 powershell.exe 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe -
Suspicious behavior: RenamesItself 16 IoCs
pid Process 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4272 powershell.exe Token: SeDebugPrivilege 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe Token: SeShutdownPrivilege 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 4780 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3844 wrote to memory of 4272 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 66 PID 3844 wrote to memory of 4272 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 66 PID 3844 wrote to memory of 4272 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 66 PID 3844 wrote to memory of 4728 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 68 PID 3844 wrote to memory of 4728 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 68 PID 3844 wrote to memory of 4728 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 68 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69 PID 3844 wrote to memory of 4780 3844 02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe"C:\Users\Admin\AppData\Local\Temp\02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exeC:\Users\Admin\AppData\Local\Temp\02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe2⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exeC:\Users\Admin\AppData\Local\Temp\02db00ca3d50065b6c10c027a64066d00d4a1cd8dbed0b77ce414a64258406f5.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4780
-