Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe
Resource
win10v2004-20220812-en
General
-
Target
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe
-
Size
256KB
-
MD5
83a749e690c3701671b4bbfb8fd90fce
-
SHA1
5c8e950247db888df6c5c21a17120147df416972
-
SHA256
abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224
-
SHA512
b45135bc94133bfba002ece9a6257ab76028aca2ce11e8608a3d00d52773645231f527afc6ce8ed9ac8b6fe77f0b9f805342e5b79e2a653ac95455593315c101
-
SSDEEP
3072:4TGfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MCagdOY39cBKaRr5xwPVB:4yepp3PJXCOGY3eqOY39cBE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" flgaar.exe -
Executes dropped EXE 1 IoCs
pid Process 1680 flgaar.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /z" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /y" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /i" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /p" abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /e" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /f" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /t" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /q" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /a" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /k" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /m" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /j" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /n" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /w" flgaar.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /o" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /p" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /d" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /b" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /v" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /u" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /x" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /s" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /l" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /h" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /g" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /r" flgaar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flgaar = "C:\\Users\\Admin\\flgaar.exe /c" flgaar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4920 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 4920 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe 1680 flgaar.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4920 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 1680 flgaar.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 1680 4920 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 90 PID 4920 wrote to memory of 1680 4920 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 90 PID 4920 wrote to memory of 1680 4920 abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe"C:\Users\Admin\AppData\Local\Temp\abcbb41b3385cc1f5c9065680742d4314f9f8f68cad118fe12359bae05929224.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\flgaar.exe"C:\Users\Admin\flgaar.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD562750032d938dc38e2bb14c2d87862ab
SHA1a5bdfc9f96337e8b6912b3e86cce8aceef656a65
SHA256053b37e0721fead960ef4333c2eb615f669d478483e223294cf6d8f7969a3a66
SHA5129bff78cc2d0a492188a1edaebd037025e29718ab8cb73fb2ad5872820f844608d528535f3c5f8653128c41a0153c50b8357dac263d6df55a81ef40ca934e63af
-
Filesize
256KB
MD562750032d938dc38e2bb14c2d87862ab
SHA1a5bdfc9f96337e8b6912b3e86cce8aceef656a65
SHA256053b37e0721fead960ef4333c2eb615f669d478483e223294cf6d8f7969a3a66
SHA5129bff78cc2d0a492188a1edaebd037025e29718ab8cb73fb2ad5872820f844608d528535f3c5f8653128c41a0153c50b8357dac263d6df55a81ef40ca934e63af