Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 23:54 UTC

General

  • Target

    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe

  • Size

    100KB

  • MD5

    925b91661d2fa7922a1320f1ea659de1

  • SHA1

    06dcbaca995e1db0de92afb654121068a519eff2

  • SHA256

    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c

  • SHA512

    2aa5fedeb52b7c8caff7a6e3a687a73a23ec1e901e9eddaac346b211a677ebef4d47fddc9ad8a2122280e8f86f05d77ab7c56bd9b4bd53f052aa24c861615e63

  • SSDEEP

    1536:1bY8iAuismyws8iLw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfaNIjnZmb:Cd/KLOM5pCnYb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe
    "C:\Users\Admin\AppData\Local\Temp\eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\sooed.exe
      "C:\Users\Admin\sooed.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3424

Network

  • flag-us
    DNS
    ns1.spansearcher.net
    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.spansearcher.net
    IN A
    Response
  • flag-us
    DNS
    ns1.spinsearcher.org
    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.spinsearcher.org
    IN A
    Response
  • flag-us
    DNS
    ns1.player1352.net
    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.player1352.net
    IN A
    Response
    ns1.player1352.net
    IN A
    35.205.61.67
  • 20.224.151.203:443
    40 B
    1
  • 20.189.173.12:443
    322 B
    7
  • 8.8.8.8:53
    ns1.spansearcher.net
    dns
    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe
    66 B
    139 B
    1
    1

    DNS Request

    ns1.spansearcher.net

  • 8.8.8.8:53
    ns1.spinsearcher.org
    dns
    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe
    66 B
    148 B
    1
    1

    DNS Request

    ns1.spinsearcher.org

  • 8.8.8.8:53
    ns1.player1352.net
    dns
    eca3858443297fda6dc124edd142916813a372390715b52182b91ccda5aec87c.exe
    64 B
    80 B
    1
    1

    DNS Request

    ns1.player1352.net

    DNS Response

    35.205.61.67

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sooed.exe

    Filesize

    100KB

    MD5

    babb30dbdd23234cfb8e0ccdbeb4ed0a

    SHA1

    d9a7217e8d2c293ff88aa6eb375a6ccad9266bf3

    SHA256

    33149217182b3597ab3a350008ca9a4c7ab061d9794958b83806cd46556e57ae

    SHA512

    15b16f7ef651f6e31164a4e2f236cbbfcb1a40e40a569fd5ddedcee28cfd8a955d97279b694eceb9eccd4e944cbe7a863020de5d5d3c3f74db2b24e79d421c0d

  • C:\Users\Admin\sooed.exe

    Filesize

    100KB

    MD5

    babb30dbdd23234cfb8e0ccdbeb4ed0a

    SHA1

    d9a7217e8d2c293ff88aa6eb375a6ccad9266bf3

    SHA256

    33149217182b3597ab3a350008ca9a4c7ab061d9794958b83806cd46556e57ae

    SHA512

    15b16f7ef651f6e31164a4e2f236cbbfcb1a40e40a569fd5ddedcee28cfd8a955d97279b694eceb9eccd4e944cbe7a863020de5d5d3c3f74db2b24e79d421c0d

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.