Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07/11/2022, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe
Resource
win10-20220901-en
General
-
Target
2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe
-
Size
1.8MB
-
MD5
f8b7ec8732cf265e48e1b245e0b55aeb
-
SHA1
f5948b0ef5030d5eca1faac33e6e3407134e95ee
-
SHA256
2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6
-
SHA512
b5337bfb5ec2c9b646cee0fea5ce3f446850c13849587ef10ee5592d8542e37939300f2316886e5013c93da3e6d4cf7b9dbe05ba95f4dcbdfe736db156ea2fc9
-
SSDEEP
49152:A6PaLZn0NgQ4QsCZMhIQaeR8q4I9u15rIQHjKoBE+:faLZn0gQ4Qs4MhIQ7091DHj5Bl
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4644 rundll32.exe 4860 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2028 wrote to memory of 4236 2028 2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe 66 PID 2028 wrote to memory of 4236 2028 2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe 66 PID 2028 wrote to memory of 4236 2028 2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe 66 PID 4236 wrote to memory of 4644 4236 control.exe 68 PID 4236 wrote to memory of 4644 4236 control.exe 68 PID 4236 wrote to memory of 4644 4236 control.exe 68 PID 4644 wrote to memory of 3348 4644 rundll32.exe 69 PID 4644 wrote to memory of 3348 4644 rundll32.exe 69 PID 3348 wrote to memory of 4860 3348 RunDll32.exe 70 PID 3348 wrote to memory of 4860 3348 RunDll32.exe 70 PID 3348 wrote to memory of 4860 3348 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe"C:\Users\Admin\AppData\Local\Temp\2c37f3ba3643e0dede3a56c26a43d48951af637f7376f2d39b9ede0229f642b6.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",5⤵
- Loads dropped DLL
PID:4860
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD531fa3b7f327aad03e7e91ca085f02174
SHA1b6bd48a4460c72d61c08301382e65a087aef31be
SHA256245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9
SHA5120ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313
-
Filesize
1.7MB
MD531fa3b7f327aad03e7e91ca085f02174
SHA1b6bd48a4460c72d61c08301382e65a087aef31be
SHA256245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9
SHA5120ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313
-
Filesize
1.7MB
MD531fa3b7f327aad03e7e91ca085f02174
SHA1b6bd48a4460c72d61c08301382e65a087aef31be
SHA256245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9
SHA5120ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313