Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 15:57

General

  • Target

    84684fb4af3a5d0d2b545a349ca1e0d2e6d98c3d1101f00c583caa1c6743ef0a.exe

  • Size

    596KB

  • MD5

    060e1b6f31b6cdec27a6781f74afd817

  • SHA1

    6b81a1ebc95d7bacd316583412fd01c15a52dc4b

  • SHA256

    84684fb4af3a5d0d2b545a349ca1e0d2e6d98c3d1101f00c583caa1c6743ef0a

  • SHA512

    761fcc303ff3386447cf32e58afba432959e5228e6722fb5ea7a6e42cb55d79f2ac1554f66cd5cb2ff61c41986e032995d463e2142d933af3932ea93496ff63b

  • SSDEEP

    12288:7DYzYK7Q21AmY/AE+zUalJJF8HIQjqyPOIQriA4:/ZSz1AmsA/UHHI+cIQmt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84684fb4af3a5d0d2b545a349ca1e0d2e6d98c3d1101f00c583caa1c6743ef0a.exe
    "C:\Users\Admin\AppData\Local\Temp\84684fb4af3a5d0d2b545a349ca1e0d2e6d98c3d1101f00c583caa1c6743ef0a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\9118.vbs"
      2⤵
        PID:1932
    • C:\Windows\svchst.exe
      C:\Windows\svchst.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 1412
        2⤵
        • Program crash
        PID:1684
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 1412
        2⤵
        • Program crash
        PID:3540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2800 -ip 2800
      1⤵
        PID:4292

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\9118.vbs

        Filesize

        500B

        MD5

        1f6f7204fb8f69c25f0a8af19c1c50f0

        SHA1

        958e3713ee2c6d1fcf90b8f3f01a83ffddd36c6c

        SHA256

        4804d615d0252a09b32c59e89ab7298af4a0d84d6bc970239a0f4dc1871e2f3d

        SHA512

        99d80c204a45454c843e5235a9cbdaf3ace69a0aaa884b858facd828c64a7bd22c5901ad337f9de8a492c88500e573d979f9680b84841baab7c5da861ef8b57e

      • C:\Windows\svchst.exe

        Filesize

        596KB

        MD5

        060e1b6f31b6cdec27a6781f74afd817

        SHA1

        6b81a1ebc95d7bacd316583412fd01c15a52dc4b

        SHA256

        84684fb4af3a5d0d2b545a349ca1e0d2e6d98c3d1101f00c583caa1c6743ef0a

        SHA512

        761fcc303ff3386447cf32e58afba432959e5228e6722fb5ea7a6e42cb55d79f2ac1554f66cd5cb2ff61c41986e032995d463e2142d933af3932ea93496ff63b

      • C:\Windows\svchst.exe

        Filesize

        596KB

        MD5

        060e1b6f31b6cdec27a6781f74afd817

        SHA1

        6b81a1ebc95d7bacd316583412fd01c15a52dc4b

        SHA256

        84684fb4af3a5d0d2b545a349ca1e0d2e6d98c3d1101f00c583caa1c6743ef0a

        SHA512

        761fcc303ff3386447cf32e58afba432959e5228e6722fb5ea7a6e42cb55d79f2ac1554f66cd5cb2ff61c41986e032995d463e2142d933af3932ea93496ff63b