Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 16:47

General

  • Target

    f411b820419a1f8ebd2df6318c6bd87db1235e65fe2bca60d7daa14ad98d39e3.exe

  • Size

    1.5MB

  • MD5

    1c0c01fbf02be6db7d7eddce53321845

  • SHA1

    713438565c8b2f4f0eeeb82931c48fc7f7c72d20

  • SHA256

    f411b820419a1f8ebd2df6318c6bd87db1235e65fe2bca60d7daa14ad98d39e3

  • SHA512

    210f88b33556389096298723e935ac8f1438a703846d1b9cc0ccd1b8c7a7843dcf4bc7fdccc289f55d88501b93fb17db28f3255c7b0ce1987b693983add10965

  • SSDEEP

    49152:VJ4odn6AYrCQvUTlPi7Fq5BBKfsoyL0UcpoM:VJ4cnjYrRUo7FiBBKkyMM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f411b820419a1f8ebd2df6318c6bd87db1235e65fe2bca60d7daa14ad98d39e3.exe
    "C:\Users\Admin\AppData\Local\Temp\f411b820419a1f8ebd2df6318c6bd87db1235e65fe2bca60d7daa14ad98d39e3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /y .\g0FY~aB.L
      2⤵
      • Loads dropped DLL
      PID:2356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\g0FY~aB.L

    Filesize

    1.5MB

    MD5

    efd31f768276370a6199d60933ee4686

    SHA1

    223fb709c545423b6bba997f5c7cce6475384cda

    SHA256

    23d2b71f104fc06f36a7ba8d2b29147b764a718d13b03828204bf4e01a02f841

    SHA512

    69fb02116a11a6ab42aa8fa6d8f938e9a2b5f36d538552e68b80b08f6e1ae978bf9b023dd00adf26f594cc44d9489145871a68bf3fc9bde1e1694cb8f90f9baf

  • C:\Users\Admin\AppData\Local\Temp\g0FY~ab.l

    Filesize

    1.5MB

    MD5

    efd31f768276370a6199d60933ee4686

    SHA1

    223fb709c545423b6bba997f5c7cce6475384cda

    SHA256

    23d2b71f104fc06f36a7ba8d2b29147b764a718d13b03828204bf4e01a02f841

    SHA512

    69fb02116a11a6ab42aa8fa6d8f938e9a2b5f36d538552e68b80b08f6e1ae978bf9b023dd00adf26f594cc44d9489145871a68bf3fc9bde1e1694cb8f90f9baf

  • memory/2356-135-0x00000000031A0000-0x00000000032B6000-memory.dmp

    Filesize

    1.1MB

  • memory/2356-136-0x00000000033E0000-0x00000000034F4000-memory.dmp

    Filesize

    1.1MB

  • memory/2356-137-0x0000000003500000-0x00000000035CD000-memory.dmp

    Filesize

    820KB

  • memory/2356-138-0x00000000035D0000-0x0000000003688000-memory.dmp

    Filesize

    736KB

  • memory/2356-139-0x00000000035D0000-0x0000000003688000-memory.dmp

    Filesize

    736KB

  • memory/2356-141-0x00000000033E0000-0x00000000034F4000-memory.dmp

    Filesize

    1.1MB