Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 11:29

General

  • Target

    40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9.exe

  • Size

    300KB

  • MD5

    0f7db5927bc419bab5564525305e1d86

  • SHA1

    7b34ad50467d2a4b6b4dd6d38d6226cee8527d4a

  • SHA256

    40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9

  • SHA512

    ea08780f4ce0552d349c05f06a69f1d3d097a1c4bd4103f0fc05c3ecb7cab9f8921fd47ca1545d0ff2afac53f2dd3bf3250be2888614b472b576e8a7c409f4ba

  • SSDEEP

    6144:qWT09e4ZEG29fr/wDSBEA5Dk1RxKLeql1gsbXrwAbvUc:qVrZN29fr/KMEvRkLeqrgsbXrwAbvUc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9.exe
    "C:\Users\Admin\AppData\Local\Temp\40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Users\Admin\vowiv.exe
      "C:\Users\Admin\vowiv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vowiv.exe

    Filesize

    300KB

    MD5

    c481f76323587b624abe66865c6c14af

    SHA1

    b1168bf662367a4448f7c933c70882d0b5ff4a4f

    SHA256

    29714fbb7c8d20df06bbc5426571a53a6a41fb35fa71e15b80a3a25e9a15c8c3

    SHA512

    baa44c47d60452a7f4d85775e01dc935a64f2e5f68b61651f7f8ce7ec59ffd9799f94f740800d2b6a0a0d24f8c1c0d5b2b7f95fa2926a7e603b52e6f4b5f752d

  • C:\Users\Admin\vowiv.exe

    Filesize

    300KB

    MD5

    c481f76323587b624abe66865c6c14af

    SHA1

    b1168bf662367a4448f7c933c70882d0b5ff4a4f

    SHA256

    29714fbb7c8d20df06bbc5426571a53a6a41fb35fa71e15b80a3a25e9a15c8c3

    SHA512

    baa44c47d60452a7f4d85775e01dc935a64f2e5f68b61651f7f8ce7ec59ffd9799f94f740800d2b6a0a0d24f8c1c0d5b2b7f95fa2926a7e603b52e6f4b5f752d