Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe
Resource
win10v2004-20220901-en
General
-
Target
35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe
-
Size
1.6MB
-
MD5
24cf7f14b3f8314659fe7e1999b9470e
-
SHA1
077bfc2b5eb4ef6926fca5b3bcb3823101cb6c0c
-
SHA256
35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a
-
SHA512
538f98eed986e696928f43eaff0563a92a2f51943e87146d3ce8eacee01363f4e83861ab300ef775949390a53a1ab536a9b826ccf4fec90834a45611bb839cb0
-
SSDEEP
49152:908/RY8vF8DMllzD55S7s6MIDCtnb5is2xXM7aJ:e8/RJv+ED5U7XDDKiHXn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe -
Loads dropped DLL 3 IoCs
pid Process 2804 rundll32.exe 4524 rundll32.exe 4524 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5028 wrote to memory of 372 5028 35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe 82 PID 5028 wrote to memory of 372 5028 35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe 82 PID 5028 wrote to memory of 372 5028 35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe 82 PID 372 wrote to memory of 2804 372 control.exe 84 PID 372 wrote to memory of 2804 372 control.exe 84 PID 372 wrote to memory of 2804 372 control.exe 84 PID 2804 wrote to memory of 4736 2804 rundll32.exe 93 PID 2804 wrote to memory of 4736 2804 rundll32.exe 93 PID 4736 wrote to memory of 4524 4736 RunDll32.exe 94 PID 4736 wrote to memory of 4524 4736 RunDll32.exe 94 PID 4736 wrote to memory of 4524 4736 RunDll32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe"C:\Users\Admin\AppData\Local\Temp\35b2eed19f92c4899d5aa1524db25d9b39056af80e99ddaf5ee36764f77ae25a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\2lY7.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\2lY7.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\2lY7.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\2lY7.cPl",5⤵
- Loads dropped DLL
PID:4524
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5c0c0b632897b1373c1947c586140d685
SHA117ef1996db1bf62096e4d8309ac97def39abdd60
SHA25639e6322429b54f75ef307aa55f65af24fdc8badc845a347d96dd20fb1ed29954
SHA512873677a5aea7eaeecaa71fa18b53d6cd5ba56fb77205e2a9d978361d482bb3bf1b60e47743e64d0e477d72c88702e89b2613e5c856200e3c9c42517ee3d6d41c
-
Filesize
1.6MB
MD5c0c0b632897b1373c1947c586140d685
SHA117ef1996db1bf62096e4d8309ac97def39abdd60
SHA25639e6322429b54f75ef307aa55f65af24fdc8badc845a347d96dd20fb1ed29954
SHA512873677a5aea7eaeecaa71fa18b53d6cd5ba56fb77205e2a9d978361d482bb3bf1b60e47743e64d0e477d72c88702e89b2613e5c856200e3c9c42517ee3d6d41c
-
Filesize
1.6MB
MD5c0c0b632897b1373c1947c586140d685
SHA117ef1996db1bf62096e4d8309ac97def39abdd60
SHA25639e6322429b54f75ef307aa55f65af24fdc8badc845a347d96dd20fb1ed29954
SHA512873677a5aea7eaeecaa71fa18b53d6cd5ba56fb77205e2a9d978361d482bb3bf1b60e47743e64d0e477d72c88702e89b2613e5c856200e3c9c42517ee3d6d41c
-
Filesize
1.6MB
MD5c0c0b632897b1373c1947c586140d685
SHA117ef1996db1bf62096e4d8309ac97def39abdd60
SHA25639e6322429b54f75ef307aa55f65af24fdc8badc845a347d96dd20fb1ed29954
SHA512873677a5aea7eaeecaa71fa18b53d6cd5ba56fb77205e2a9d978361d482bb3bf1b60e47743e64d0e477d72c88702e89b2613e5c856200e3c9c42517ee3d6d41c