Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe
Resource
win10v2004-20220812-en
General
-
Target
4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe
-
Size
84KB
-
MD5
a172dfd1f1ee142fe5e6155e6490ee50
-
SHA1
871c04aeec41b1b4b134df12ab6babf3f5abd8d3
-
SHA256
4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e
-
SHA512
307dcef9b4937f0df408d595e1bc2b0954a0eeb131515c41ac4d9f38856e6f7bbfcca7fd8b5b91d98267dbb6fe6a88a6ee34089adaa295a2e9f82c98f8cc494e
-
SSDEEP
1536:MJV+q7wRRjJF2oafPl38cPQep5TfjDS9i51+2SI4iMo/XsMe:vqcTjJF2oaX9pjr3XlqM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4856 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4856 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2996 4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2040 2996 4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe 79 PID 2996 wrote to memory of 2040 2996 4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe 79 PID 2996 wrote to memory of 2040 2996 4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe 79 PID 2040 wrote to memory of 4856 2040 cmd.exe 81 PID 2040 wrote to memory of 4856 2040 cmd.exe 81 PID 2040 wrote to memory of 4856 2040 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe"C:\Users\Admin\AppData\Local\Temp\4b2f1257d593c5211b7ef52c3b93ca03241c638e04bf216549c25577bb10c40e.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 4b2f1257d593c5211b7ef52c3b93ca03242⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-