Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 23:47
Behavioral task
behavioral1
Sample
fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe
Resource
win10v2004-20220812-en
General
-
Target
fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe
-
Size
518KB
-
MD5
59a1209fd5104cdf65e1b754cb37b6fe
-
SHA1
479d9d79431b30eaf21fb94bb17cad8b29bf2b25
-
SHA256
fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2
-
SHA512
31c6753527543ddd35001ab0df7bbe7d8fec858d3344040023479b939654c175947e81c2ad753a1ddc1af1a21cb0c87b316ce268f26933b07c24e0c7aa399c15
-
SSDEEP
12288:BIFs0zHpoflirqzRI6APGeCC58ZzRX/PEeVrpw8ggffFNY:Ss2oUoIFPGs58ZWeZpJrffU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2444 server.exe 5104 server.exe -
resource yara_rule behavioral2/memory/4964-132-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4964-137-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4964-151-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2444 4964 fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe 82 PID 4964 wrote to memory of 2444 4964 fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe 82 PID 4964 wrote to memory of 2444 4964 fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe 82 PID 2444 wrote to memory of 5104 2444 server.exe 83 PID 2444 wrote to memory of 5104 2444 server.exe 83 PID 2444 wrote to memory of 5104 2444 server.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe"C:\Users\Admin\AppData\Local\Temp\fe911f2c398654fee81bb607a11376e6149e12984969a6a4c388a0022ab5e0a2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\server.exe"C:\server.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
PID:5104
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD574d99ee65f4b76339e026911590fa1fb
SHA18a824b87d7a980b7a632fcbaeb7fcdf41b09e4d9
SHA25608522880b7c4c69674ad3242f042b941759a7e0c085b4720b29f183cc3bfda16
SHA51207a85686505bc35a251f4adf02023f1e0765a8f464e2d5287e70449381f17fa3b9249c446ab4959fa200fbace9578e1442ec8d984e1862623afb6ecf50e4b2f8
-
Filesize
213KB
MD574d99ee65f4b76339e026911590fa1fb
SHA18a824b87d7a980b7a632fcbaeb7fcdf41b09e4d9
SHA25608522880b7c4c69674ad3242f042b941759a7e0c085b4720b29f183cc3bfda16
SHA51207a85686505bc35a251f4adf02023f1e0765a8f464e2d5287e70449381f17fa3b9249c446ab4959fa200fbace9578e1442ec8d984e1862623afb6ecf50e4b2f8
-
Filesize
5KB
MD5c548f9962a465f9fd61150557bf00422
SHA12506087c02eb73f4660f7995ac4f5a63c2da4e7d
SHA2561e996b9e2a779885a3dd61bbe3b32125bbc35e4030eba542834c2cd2b15640c2
SHA5126a52cd210e84c1bfd1ecb13a7cbb9188e8005f2aa057b065223543e91630adbef4e0957218e945ea497c81c149fd925acf577f9d25f5247e909f61efb3dd4889
-
Filesize
364KB
MD5b723a6e300a5f0f86d488aeaab4b81e0
SHA18fccdaf0e16ce1baebf2466dd169463cd488070d
SHA2560b21af1244263139d20f32796f0f3c41a97bea06afa906e2086732ef0a513c85
SHA5123e2e6f504195cb5ae837e50433d1c8742d06206ac52febb105fc5fa4b04d7735efecae0da0ea259dea308adbaaaa3b66fc394a93ad3c323879a5d737329e43ad
-
Filesize
364KB
MD5b723a6e300a5f0f86d488aeaab4b81e0
SHA18fccdaf0e16ce1baebf2466dd169463cd488070d
SHA2560b21af1244263139d20f32796f0f3c41a97bea06afa906e2086732ef0a513c85
SHA5123e2e6f504195cb5ae837e50433d1c8742d06206ac52febb105fc5fa4b04d7735efecae0da0ea259dea308adbaaaa3b66fc394a93ad3c323879a5d737329e43ad