Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 15:57
Behavioral task
behavioral1
Sample
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe
Resource
win10v2004-20221111-en
General
-
Target
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe
-
Size
284KB
-
MD5
193405676d996ea5dbb5442293f2a0d6
-
SHA1
6a38ba3d2c4356b718cae935fc97bd423a3e0d2f
-
SHA256
d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4
-
SHA512
33a25f42c2d028a5ce8c53537064e94d569873e65c3b4faa102eed29a0a6bea9cc0e437d7b22a333661e86028b55d9b93c00c3d24003c6615b1878d5bde320f7
-
SSDEEP
6144:auMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6EmRzx:a+YcUc6SBLLTSEgBAnhc1kGsx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe NOTEPAD1.exe" d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/4464-132-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/4464-137-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\NOTEPAD1.exe" d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\s: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\w: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\y: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\g: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\b: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\k: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\l: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\m: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\o: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\t: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\u: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\a: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\x: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\i: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\n: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\p: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\v: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\z: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\f: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\j: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\q: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\r: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened (read-only) \??\e: d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4464-137-0x0000000000400000-0x00000000004A5000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened for modification C:\Windows\SysWOW64\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File created C:\Windows\SysWOW64\WORD.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened for modification C:\Windows\SysWOW64\WORD.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened for modification C:\Windows\SysWOW64\autorun.ini d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe File opened for modification C:\Windows\NOTEPAD1.exe d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4464 wrote to memory of 2200 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 85 PID 4464 wrote to memory of 2200 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 85 PID 4464 wrote to memory of 2200 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 85 PID 2200 wrote to memory of 460 2200 cmd.exe 87 PID 2200 wrote to memory of 460 2200 cmd.exe 87 PID 2200 wrote to memory of 460 2200 cmd.exe 87 PID 4464 wrote to memory of 4584 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 88 PID 4464 wrote to memory of 4584 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 88 PID 4464 wrote to memory of 4584 4464 d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe 88 PID 4584 wrote to memory of 3384 4584 cmd.exe 90 PID 4584 wrote to memory of 3384 4584 cmd.exe 90 PID 4584 wrote to memory of 3384 4584 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe"C:\Users\Admin\AppData\Local\Temp\d6fa27a87367e5b7b60a3d47f5f492456a118fc0896ce470293ce3d28f6ef4d4.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe3⤵PID:3384
-
-