Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 08:39

General

  • Target

    f6d9c6e7a29a3254cd86b7fc7d1242383652fa7ded6ee2597111743dea2fbe65.exe

  • Size

    32KB

  • MD5

    017929e12fa75b53b617634541a9c6f9

  • SHA1

    a20c83788bbdd8a3b711e90716bdfa551a4231e2

  • SHA256

    f6d9c6e7a29a3254cd86b7fc7d1242383652fa7ded6ee2597111743dea2fbe65

  • SHA512

    d150f7fdb63aba86c90948379d32482961d75d98954bda1cad8a5628b7558c73d5010c90676ccb1c509400e131d5aca4c24d8609ecfce39e75e11908b6c289bf

  • SSDEEP

    768:p3sk30si1NqUulCjSYIFVVKqqzocVVzrAlUn5BDY:CkE97MCjSmTFrG2zM

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Runs ping.exe 1 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6d9c6e7a29a3254cd86b7fc7d1242383652fa7ded6ee2597111743dea2fbe65.exe
    "C:\Users\Admin\AppData\Local\Temp\f6d9c6e7a29a3254cd86b7fc7d1242383652fa7ded6ee2597111743dea2fbe65.exe"
    1⤵
    • Adds policy Run key to start application
    • Checks computer location settings
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\dfDelmlljy.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:5092
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4412
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:308
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4240
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1568
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4692
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4040 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3456
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\dfDelmlljy.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    5f49b65bdc1713b58ed97d0e9625a968

    SHA1

    84b74e55478c9abb163aa6629e3fd3b91bed4806

    SHA256

    a681ab9abc281fd12a7bd06f56e36a21e8ee28b5294815c5e07b781e324a32f9

    SHA512

    4b502288bef324db8ad33e63c7b6f242ef7954a6fbec3ed012530044c82fee3ad1158febe088bc0deea67ac35646a0a1bd6d961c0f67b11fee584e4f1abd753a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    fc17be2b016270f2d9286e826b1ce408

    SHA1

    3f248d339eae442204d8f1645ea10223a8a75551

    SHA256

    63c7fa1aaffe69f271f54025c5ea007854af8ad7e5e766f92a96d3281d636213

    SHA512

    ec5acbb4aac7fc45b1e733908a9dba23fe22c2fe8a8d4e173dcb5eb17df3bd6130c3e3d3d75ae1d81ed49f9304f1eb6cf0f72246a476a6df724116c6d8fffcb7

  • C:\dfDelmlljy.bat

    Filesize

    269B

    MD5

    c9f6d0ba831b75958d78dfaf5603b0ad

    SHA1

    dcdb4003c92b66d9e155543ce2a1f0407fa7daa7

    SHA256

    72e377b15e127ae8080eeba8698041fdf390ed573010609f729686c9bd68c28e

    SHA512

    fb188d9d0d2812127b5bf468a8638f04d41f35a31b07b99626cbc539dbc69289fc19b18e85872d79e0051651f796f47274df1e83e900857381550fea8db6db32

  • C:\dfDelmlljy.bat

    Filesize

    269B

    MD5

    c9f6d0ba831b75958d78dfaf5603b0ad

    SHA1

    dcdb4003c92b66d9e155543ce2a1f0407fa7daa7

    SHA256

    72e377b15e127ae8080eeba8698041fdf390ed573010609f729686c9bd68c28e

    SHA512

    fb188d9d0d2812127b5bf468a8638f04d41f35a31b07b99626cbc539dbc69289fc19b18e85872d79e0051651f796f47274df1e83e900857381550fea8db6db32