Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe
Resource
win10v2004-20220812-en
General
-
Target
e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe
-
Size
293KB
-
MD5
3a87456630da7362cc15e14b18047caf
-
SHA1
7da577c53cfe7cd79c56f7bed9b1ff7d26245075
-
SHA256
e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b
-
SHA512
881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80
-
SSDEEP
6144:0hKBmh9L7xLmywFKId798LL2oQyerjwb5a:hB+nxUd798LjQyeU5a
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4836 rovwer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4900 4888 WerFault.exe 16 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5016 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4836 4888 e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe 86 PID 4888 wrote to memory of 4836 4888 e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe 86 PID 4888 wrote to memory of 4836 4888 e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe"C:\Users\Admin\AppData\Local\Temp\e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"2⤵
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 11922⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4888 -ip 48881⤵PID:4760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD53d144cf8c69c65608b0b84a9d7150ba7
SHA11f744dde612d0324b56a7bd5b85b39596bf86740
SHA256fa1eceaf621293f1ec02a27933a3763e08732a0d03ef63b34edb89dbcad4dd2a
SHA5124a675e9931e1dab1e2e1ed222df7b95373a8f5cbb5641296ab133a6054026245753566636c7a3fd344b30a12ab4b6b6272f11976c79acccc3d40fceea46e4bdd
-
Filesize
64KB
MD5254e04bafada88bef458108bd57d6e0c
SHA17ca82609bb72735751e513a23cea3b4e99842150
SHA2560d4b0efe86179220c27ebe733c568124a23bd450ae79b8b23b08620077de9852
SHA512fd56190f04e6870a29bbb12a3a64dfc8b4d99a95f98af01eea88cbe4ff64328ac071841b201530dd67e2e48afdc1ec6ec08da8e9ed4a874d26226039932c07f0