Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2022, 05:03

General

  • Target

    L2Server/L2Server.exe

  • Size

    12.6MB

  • MD5

    8235a379be7a063b9d90a38e276cbb30

  • SHA1

    b6174fc0b2de1aecb09c12fc73e9369e5a5b95c5

  • SHA256

    203e3300d1e76dbc45e0c0e1b5d0e0388e1143924333398954016c6003b45511

  • SHA512

    3f30fb08ee92a73a3a19dc22c3440b2afef2a5babc735dfdea04021180440b5baaf444d975c9bae502c73fe823ce9d0f419dd71ffdc9960f655071130e3152c3

  • SSDEEP

    98304:FayXbXfSoVXB8H7cyxOhtwTN2EBLBYFZpECfzIKOQG8GHk91bBqnA4WgX32daeH3:FlXbPDVXB27cXtwTN2EFBIFzIRQLmeH3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\L2Server\L2Server.exe
    "C:\Users\Admin\AppData\Local\Temp\L2Server\L2Server.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir bak
      2⤵
        PID:4656
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move LinError.txt.*.bak bak\
        2⤵
          PID:876
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move minidump_*.dmp bak\
          2⤵
            PID:3408

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads