Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
29/10/2022, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe
Resource
win10-20220901-en
General
-
Target
277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe
-
Size
1.6MB
-
MD5
cde339c5674db0ad5455c3d35ee35a43
-
SHA1
d105281e31292d6acbfbb74e0b4e1e0541ca3bcb
-
SHA256
277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124
-
SHA512
68db971a81d4b546e16ef76975ff5b1416126a7d4fa52057b18a04c97f3bd7419d0c946597efcdd0a200cc21c5cfce6cdbd06c58e024bc35a3b04997b212eb23
-
SSDEEP
49152:oeZB+BfJXAEEWsx/0YqlytNkIVcnHMgu+DzU:oeZB+BfKEEX0YqAtNZcHpu4A
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1708 rundll32.exe 3780 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4604 4740 277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe 66 PID 4740 wrote to memory of 4604 4740 277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe 66 PID 4740 wrote to memory of 4604 4740 277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe 66 PID 4604 wrote to memory of 1708 4604 control.exe 68 PID 4604 wrote to memory of 1708 4604 control.exe 68 PID 4604 wrote to memory of 1708 4604 control.exe 68 PID 1708 wrote to memory of 3572 1708 rundll32.exe 69 PID 1708 wrote to memory of 3572 1708 rundll32.exe 69 PID 3572 wrote to memory of 3780 3572 RunDll32.exe 70 PID 3572 wrote to memory of 3780 3572 RunDll32.exe 70 PID 3572 wrote to memory of 3780 3572 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe"C:\Users\Admin\AppData\Local\Temp\277c368fafb90dac862548f54c59988c3a620b0eecaf7be9d46fa292b4527124.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\P9dkbOO.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\P9dkbOO.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\P9dkbOO.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\P9dkbOO.CPL",5⤵
- Loads dropped DLL
PID:3780
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD51337484221ec4d9f749abc910a936c24
SHA1aa08e8e43fd3879acbb436a0584c65d9fd015059
SHA2569c80c17c03a895852c6bfadfbba653792718aa94f897347d3e5eeaf0066f2f1a
SHA512baeec6b9ff0c42ba464fe55354f62a8d8d92f15db378e374bea587afd65f1b1cb553493b95e97dd0e80e77b5a2d1c459b2a828eac0db82aa4e894fb20516fb91
-
Filesize
2.2MB
MD51337484221ec4d9f749abc910a936c24
SHA1aa08e8e43fd3879acbb436a0584c65d9fd015059
SHA2569c80c17c03a895852c6bfadfbba653792718aa94f897347d3e5eeaf0066f2f1a
SHA512baeec6b9ff0c42ba464fe55354f62a8d8d92f15db378e374bea587afd65f1b1cb553493b95e97dd0e80e77b5a2d1c459b2a828eac0db82aa4e894fb20516fb91
-
Filesize
2.2MB
MD51337484221ec4d9f749abc910a936c24
SHA1aa08e8e43fd3879acbb436a0584c65d9fd015059
SHA2569c80c17c03a895852c6bfadfbba653792718aa94f897347d3e5eeaf0066f2f1a
SHA512baeec6b9ff0c42ba464fe55354f62a8d8d92f15db378e374bea587afd65f1b1cb553493b95e97dd0e80e77b5a2d1c459b2a828eac0db82aa4e894fb20516fb91