Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
212s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe
Resource
win10v2004-20221111-en
General
-
Target
a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe
-
Size
780KB
-
MD5
1e85709c537a55ca4816aad062848fd7
-
SHA1
c5e1bc1c8b77148130832cd5127a1f5ffd31d789
-
SHA256
a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d
-
SHA512
f36f6fa98b7ce75424d45638f9353cadb753b6df0000cd973ebe6c7317ff7cc1c934416e426d3f4339fb1b97426e60ac8734d320da94bcae77af62f061147917
-
SSDEEP
12288:0q+oM6kHhiITgsJxhk51g7Cd7wdqTxuCi+7zXHYDe0vSvqINrsfo:0JVhRJx62767j9i2GaLj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FolderName\\file.exe" a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe -
Executes dropped EXE 1 IoCs
pid Process 4292 sfdfdfds .exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows/system32\\system32.exe" sfdfdfds .exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini sfdfdfds .exe File opened for modification C:\Windows\assembly\Desktop.ini sfdfdfds .exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 620 set thread context of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini sfdfdfds .exe File opened for modification C:\Windows\assembly sfdfdfds .exe File created C:\Windows\assembly\Desktop.ini sfdfdfds .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 1248 timeout.exe 3436 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3888 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4292 sfdfdfds .exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe Token: SeDebugPrivilege 4292 sfdfdfds .exe Token: SeDebugPrivilege 3888 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4292 sfdfdfds .exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 620 wrote to memory of 3492 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 82 PID 620 wrote to memory of 3492 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 82 PID 620 wrote to memory of 3492 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 82 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 3492 wrote to memory of 760 3492 cmd.exe 85 PID 3492 wrote to memory of 760 3492 cmd.exe 85 PID 3492 wrote to memory of 760 3492 cmd.exe 85 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 620 wrote to memory of 4292 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 84 PID 760 wrote to memory of 4084 760 wscript.exe 86 PID 760 wrote to memory of 4084 760 wscript.exe 86 PID 760 wrote to memory of 4084 760 wscript.exe 86 PID 620 wrote to memory of 3432 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 88 PID 620 wrote to memory of 3432 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 88 PID 620 wrote to memory of 3432 620 a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe 88 PID 3432 wrote to memory of 3436 3432 cmd.exe 90 PID 3432 wrote to memory of 3436 3432 cmd.exe 90 PID 3432 wrote to memory of 3436 3432 cmd.exe 90 PID 3432 wrote to memory of 3888 3432 cmd.exe 99 PID 3432 wrote to memory of 3888 3432 cmd.exe 99 PID 3432 wrote to memory of 3888 3432 cmd.exe 99 PID 3432 wrote to memory of 2164 3432 cmd.exe 100 PID 3432 wrote to memory of 2164 3432 cmd.exe 100 PID 3432 wrote to memory of 2164 3432 cmd.exe 100 PID 3432 wrote to memory of 1248 3432 cmd.exe 101 PID 3432 wrote to memory of 1248 3432 cmd.exe 101 PID 3432 wrote to memory of 1248 3432 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe"C:\Users\Admin\AppData\Local\Temp\a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\FolderName\mata.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\FolderName\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\FolderName\mata2.bat3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FolderName\mata2.bat" "4⤵
- Drops startup file
PID:4084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sfdfdfds .exe"C:\Users\Admin\AppData\Local\Temp\sfdfdfds .exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FolderName\stres.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:3436
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq sfdfdfds .exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Windows\SysWOW64\find.exefind /i "sfdfdfds .exe"3⤵PID:2164
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:1248
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD51e85709c537a55ca4816aad062848fd7
SHA1c5e1bc1c8b77148130832cd5127a1f5ffd31d789
SHA256a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d
SHA512f36f6fa98b7ce75424d45638f9353cadb753b6df0000cd973ebe6c7317ff7cc1c934416e426d3f4339fb1b97426e60ac8734d320da94bcae77af62f061147917
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
69B
MD5c96a3b31fc4a115c977ce5d8a3256f4f
SHA18c71b0d75099af30ac1fe33266e3970b47ba716d
SHA256a5b672a4863abcf46556d2e606b2833e8897a3206e554ad93043a82a792df49e
SHA512f4337e85ca0b3c0242c35a09f1ff7154c9e37ea3c7de3c2337385fb4b57e25a8550877ce2f37d023c94a3fa69b2b4e003207790297879d29a5bbe4856d0a0f48
-
Filesize
176B
MD5b77f8e41f69f39412b204cc781212baa
SHA138d70fce7d44d1935955cf4b519664c7969d5989
SHA25605ebddcab0758b634954345905825e611eed207bbbb989e6dded1e3476e5deab
SHA5128b404359b8c854822fb97262c55dad5293a75d353ba2a2210840c9fbbea96e3ff985856601bb6ca4d10bc21effb3af33558e0c2d9c90128133ae35fe09dccb61
-
Filesize
780KB
MD51e85709c537a55ca4816aad062848fd7
SHA1c5e1bc1c8b77148130832cd5127a1f5ffd31d789
SHA256a60c8f0490534472a789ebd6a3d9646b0c4508af4c4004a3717a4c0405be269d
SHA512f36f6fa98b7ce75424d45638f9353cadb753b6df0000cd973ebe6c7317ff7cc1c934416e426d3f4339fb1b97426e60ac8734d320da94bcae77af62f061147917
-
Filesize
212B
MD525293cb5844f3cd3baa09eaac5388180
SHA13c7cd847f5b8d115f48b17b0e63458348da12989
SHA25692cadcd4e6f72a3b7754b592bd282c869be692c50bc136498df9a24982cb9258
SHA512edcedcc74b4a1af4d6364fefd8c419ebac9c3d39f08f0bc6b697d655fd973ab88baa3afb3042b12296600206a65b8ebd5fb6966a7162274aacb7f0cf2691bf04
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479