Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe
Resource
win10v2004-20220812-en
General
-
Target
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe
-
Size
36KB
-
MD5
2e79af552fa6d3bd2cb654cc0f15cd76
-
SHA1
6fb5432411473781c8ccdf1e597400bbdc158e47
-
SHA256
d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6
-
SHA512
8a764df6346114fce2a8f68badd94ff840aa1dc3b3e16400e36268789fdcd11fde6baa44d9bfec799426d2add7a8d4166680a0a24bde1297284dbbe3fd4a436b
-
SSDEEP
768:sVIYHMBz+C7PA4pQ3RLB4rHzdfD2W2+6z:sVTHMBzRbahNahbM+6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4476 jusched.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4476 set thread context of 2848 4476 jusched.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4648 2848 WerFault.exe 78 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5072 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 4476 jusched.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4476 5072 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 76 PID 5072 wrote to memory of 4476 5072 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 76 PID 5072 wrote to memory of 4476 5072 d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe 76 PID 4476 wrote to memory of 2848 4476 jusched.exe 78 PID 4476 wrote to memory of 2848 4476 jusched.exe 78 PID 4476 wrote to memory of 2848 4476 jusched.exe 78 PID 4476 wrote to memory of 2848 4476 jusched.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe"C:\Users\Admin\AppData\Local\Temp\d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\jusched.exe"C:\Users\Admin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 844⤵
- Program crash
PID:4648
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2848 -ip 28481⤵PID:1972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD52e79af552fa6d3bd2cb654cc0f15cd76
SHA16fb5432411473781c8ccdf1e597400bbdc158e47
SHA256d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6
SHA5128a764df6346114fce2a8f68badd94ff840aa1dc3b3e16400e36268789fdcd11fde6baa44d9bfec799426d2add7a8d4166680a0a24bde1297284dbbe3fd4a436b
-
Filesize
36KB
MD52e79af552fa6d3bd2cb654cc0f15cd76
SHA16fb5432411473781c8ccdf1e597400bbdc158e47
SHA256d09f758d6b59f0712c2b11b1ebe8a9b50b0f8381af7fe37239bd847e3b323db6
SHA5128a764df6346114fce2a8f68badd94ff840aa1dc3b3e16400e36268789fdcd11fde6baa44d9bfec799426d2add7a8d4166680a0a24bde1297284dbbe3fd4a436b