Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe
Resource
win10v2004-20220901-en
General
-
Target
a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe
-
Size
654KB
-
MD5
d271734f425ec2ba4e1018ff5ffa8343
-
SHA1
a351d795076e068d320d2dc49a6f231e0429947a
-
SHA256
a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b
-
SHA512
9e408addce17fca7149788a61e23d35a49c13a1ac4f3c8a56f95606d0c36fc66cbc78de30126d3935e61bf03b5600417183bce6c753e204ce55c370784213e22
-
SSDEEP
3072:TfTflRNjzPF5OncVbrCVru0K67rMjb+2:LTfbz5W6bEu0LMjb+2
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 452 winlogon.exe 4616 winlogon.exe 3600 winlogon.exe 1452 winlogon.exe -
resource yara_rule behavioral2/memory/2216-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2216-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2216-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2216-144-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4616-149-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4616-150-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4616-156-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3724 set thread context of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 452 set thread context of 4616 452 winlogon.exe 88 PID 4616 set thread context of 3600 4616 winlogon.exe 89 PID 4616 set thread context of 1452 4616 winlogon.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2508 3600 WerFault.exe 89 996 1452 WerFault.exe 100 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2216 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 4616 winlogon.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3724 wrote to memory of 2840 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 83 PID 3724 wrote to memory of 2840 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 83 PID 3724 wrote to memory of 2840 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 83 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 3724 wrote to memory of 2216 3724 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 84 PID 2216 wrote to memory of 452 2216 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 86 PID 2216 wrote to memory of 452 2216 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 86 PID 2216 wrote to memory of 452 2216 a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe 86 PID 452 wrote to memory of 2484 452 winlogon.exe 87 PID 452 wrote to memory of 2484 452 winlogon.exe 87 PID 452 wrote to memory of 2484 452 winlogon.exe 87 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 452 wrote to memory of 4616 452 winlogon.exe 88 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 3600 4616 winlogon.exe 89 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100 PID 4616 wrote to memory of 1452 4616 winlogon.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe"C:\Users\Admin\AppData\Local\Temp\a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:2484
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 126⤵
- Program crash
PID:2508
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 126⤵
- Program crash
PID:996
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3600 -ip 36001⤵PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1452 -ip 14521⤵PID:4504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654KB
MD5d271734f425ec2ba4e1018ff5ffa8343
SHA1a351d795076e068d320d2dc49a6f231e0429947a
SHA256a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b
SHA5129e408addce17fca7149788a61e23d35a49c13a1ac4f3c8a56f95606d0c36fc66cbc78de30126d3935e61bf03b5600417183bce6c753e204ce55c370784213e22
-
Filesize
654KB
MD5d271734f425ec2ba4e1018ff5ffa8343
SHA1a351d795076e068d320d2dc49a6f231e0429947a
SHA256a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b
SHA5129e408addce17fca7149788a61e23d35a49c13a1ac4f3c8a56f95606d0c36fc66cbc78de30126d3935e61bf03b5600417183bce6c753e204ce55c370784213e22
-
Filesize
654KB
MD5d271734f425ec2ba4e1018ff5ffa8343
SHA1a351d795076e068d320d2dc49a6f231e0429947a
SHA256a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b
SHA5129e408addce17fca7149788a61e23d35a49c13a1ac4f3c8a56f95606d0c36fc66cbc78de30126d3935e61bf03b5600417183bce6c753e204ce55c370784213e22
-
Filesize
654KB
MD5d271734f425ec2ba4e1018ff5ffa8343
SHA1a351d795076e068d320d2dc49a6f231e0429947a
SHA256a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b
SHA5129e408addce17fca7149788a61e23d35a49c13a1ac4f3c8a56f95606d0c36fc66cbc78de30126d3935e61bf03b5600417183bce6c753e204ce55c370784213e22
-
Filesize
654KB
MD5d271734f425ec2ba4e1018ff5ffa8343
SHA1a351d795076e068d320d2dc49a6f231e0429947a
SHA256a1a16334aabecd72c2d43bd7c1a27c45841e11624d25125f3ade0a5b2c2d543b
SHA5129e408addce17fca7149788a61e23d35a49c13a1ac4f3c8a56f95606d0c36fc66cbc78de30126d3935e61bf03b5600417183bce6c753e204ce55c370784213e22