Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2022, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
TdndchBWGClEyG.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TdndchBWGClEyG.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
required documents.lnk
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
required documents.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
wabPTLAqdTmbJu.bat
Resource
win7-20221111-en
General
-
Target
required documents.lnk
-
Size
995B
-
MD5
32718d69a0919473c89e529b04a7cd38
-
SHA1
d0c4c19cf77676d2827e9b9596796583d95dce37
-
SHA256
d3c9dc14d8396686cb3c12b1a483ca30943d731f733614fda85e1039bff611c5
-
SHA512
b1119c69fb1c1205250a10ab4893072b4ed45f38f5b0af9fdfa8a6c442f738571cd09b5767345ce47414681475bd9e57fc1526185493c9c30cb8311c96e2c4ba
Malware Config
Extracted
bumblebee
15repl
23.108.57.200:443
103.144.139.158:443
23.106.160.52:443
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 29 2976 rundll32.exe 35 2976 rundll32.exe 38 2976 rundll32.exe 39 2976 rundll32.exe 41 2976 rundll32.exe 42 2976 rundll32.exe 43 2976 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2976 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4960 wrote to memory of 2100 4960 cmd.exe 82 PID 4960 wrote to memory of 2100 4960 cmd.exe 82 PID 2100 wrote to memory of 2976 2100 cmd.exe 83 PID 2100 wrote to memory of 2976 2100 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required documents.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wabPTLAqdTmbJu.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\rundll32.exerundll32 TdndchBWGClEyG.dll,appMainRun3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2976
-
-