Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    166s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 20:59

General

  • Target

    434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe

  • Size

    212KB

  • MD5

    52d8c58d4c6e9581d4459b40b99c488c

  • SHA1

    e83a1724be4af196018ec1658f9cb85a1178a7ad

  • SHA256

    434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51

  • SHA512

    a58d6c135028d627d4f0edffcb422dffe9fba8000f601d6ce23c1e6810452bec1f4fc07fb5cee1b35f6db8dfc00681580d2ee3a8018e7e369f60e6a17af1a77c

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDm+:dHp/urb4A1WdBfl

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 19 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe
    "C:\Users\Admin\AppData\Local\Temp\434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4236
    • \??\c:\Program Files44S0N6.exe
      "c:\Program Files44S0N6.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1292
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2092
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        PID:1284
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
        PID:764

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files44S0N6.exe

      Filesize

      36KB

      MD5

      b43bfb7245082ddb832d6a99d4962768

      SHA1

      645e73c5b62904b106d4c992677a35b2ec44541a

      SHA256

      2a522ce10973755abf804b766a0bfc6e8f5386dfdfd0aefeb1b5c580a98c405e

      SHA512

      94a535f81c3010593106e875880e79b8b49ff7e05869b38a4a43986b7511857e55cf1232cf5e9f990c3c1e01e21c19d32e7c13a3250b8a776ac35a7b2625962d

    • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

      Filesize

      486B

      MD5

      9cc04eb9c773aac48de2cb3a8813c51b

      SHA1

      48910a6cbdae6a8e0d97887e123e92ce276e04d2

      SHA256

      5e4956b6c3a17ea2fee006e43f48d8f99441e31e42b3333930ac087ca4256434

      SHA512

      dcdbb164616993280e37028a58b782e0342cc55120fc92a3a509c3534989102779bd1628c81d0c6f8d5ef980835f544faf53de805411042fe67c4ae001d96bff

    • \??\c:\Program Files44S0N6.exe

      Filesize

      36KB

      MD5

      b43bfb7245082ddb832d6a99d4962768

      SHA1

      645e73c5b62904b106d4c992677a35b2ec44541a

      SHA256

      2a522ce10973755abf804b766a0bfc6e8f5386dfdfd0aefeb1b5c580a98c405e

      SHA512

      94a535f81c3010593106e875880e79b8b49ff7e05869b38a4a43986b7511857e55cf1232cf5e9f990c3c1e01e21c19d32e7c13a3250b8a776ac35a7b2625962d