Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 11:27

General

  • Target

    f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686.exe

  • Size

    256KB

  • MD5

    0c16f6ff28c97f82ca78ab7e1c56222a

  • SHA1

    06a61d92153e5382cff415c99eed66006c627190

  • SHA256

    f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686

  • SHA512

    65faa58680dfe9bf63dc3c7c77386b87cbf975ef53ed20aa330631f775b3c8062326a870c1b5e10e53beeeda8f0b42da0cea4cf93b74ce2831ddda4635d05b28

  • SSDEEP

    6144:hVEuQZUvhOoOirF1rsNjqH94M7RNo913Ml2Knvmb7/D26QkQeOzRAa:PQZUvhOoOMF1rsNjqgH3Ml2Knvmb7/Dq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686.exe
    "C:\Users\Admin\AppData\Local\Temp\f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Users\Admin\seate.exe
      "C:\Users\Admin\seate.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4460

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\seate.exe

    Filesize

    256KB

    MD5

    6ba457e81998ec3d460947f63132aaad

    SHA1

    f32cd9d9896217665125a6ac7318210076dda714

    SHA256

    86cc951e9f1bd5c52a8ac405bcf36796af1a5ca80ad19fde5f6c120c20071587

    SHA512

    484045239d9e55773825addedb00c15824f1928a04659fc1da6824288e22b9fcda9f6ba2c0c6e9ca98f75a7bada98b47b173f49075f4f4b57592acc0a9dba195

  • C:\Users\Admin\seate.exe

    Filesize

    256KB

    MD5

    6ba457e81998ec3d460947f63132aaad

    SHA1

    f32cd9d9896217665125a6ac7318210076dda714

    SHA256

    86cc951e9f1bd5c52a8ac405bcf36796af1a5ca80ad19fde5f6c120c20071587

    SHA512

    484045239d9e55773825addedb00c15824f1928a04659fc1da6824288e22b9fcda9f6ba2c0c6e9ca98f75a7bada98b47b173f49075f4f4b57592acc0a9dba195