Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe
Resource
win10v2004-20220812-en
General
-
Target
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe
-
Size
1.5MB
-
MD5
0d2ad44bbdc2e94bdfc5efebeb248c8e
-
SHA1
da4f7cfcdc8cc884e57d744419c2955a8e8941b2
-
SHA256
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a
-
SHA512
414ca76dcf986ebb3b432389a507186b6613fef545bb3f6ad0cee03ccad8308f380183dd551b3624d2de272876f317d789740f61e7044cfec2881f50596f82bd
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGC:wcZC35VcOcmDcc6CdI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4996 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3184 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 3184 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 3184 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 3184 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 3184 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2528 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 79 PID 3028 wrote to memory of 2528 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 79 PID 3028 wrote to memory of 2528 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 79 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 3028 wrote to memory of 3184 3028 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 80 PID 2528 wrote to memory of 4996 2528 cmd.exe 82 PID 2528 wrote to memory of 4996 2528 cmd.exe 82 PID 2528 wrote to memory of 4996 2528 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3184
-