Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2022, 23:21

General

  • Target

    32e32e15e18b1e06066cbe0f6167c517959393dc869e100e42d263722a70ea80.exe

  • Size

    11KB

  • MD5

    6a4f3cd6f988e0d3bd196f5574f09f30

  • SHA1

    6602cb29c8e7bc618f7f7d0f05534fdc3ef2a07f

  • SHA256

    32e32e15e18b1e06066cbe0f6167c517959393dc869e100e42d263722a70ea80

  • SHA512

    755c01bc2c4b8306906067e60fdab3845b05f2341c6751590c510902072629e8c4aaf97cd07cee92e47eca0d52b3163460ffdfc2f5b714f2df0fb6a1e8d14989

  • SSDEEP

    96:leMserrcUi9gxHTi+hMuTckeetFXg+wiLonE/Tgr9VOrIBYj3tG2gxeypbeYOvRK:vZH+V+cXezwbE/c6rqYZHhY9iQR/p

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32e32e15e18b1e06066cbe0f6167c517959393dc869e100e42d263722a70ea80.exe
    "C:\Users\Admin\AppData\Local\Temp\32e32e15e18b1e06066cbe0f6167c517959393dc869e100e42d263722a70ea80.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Users\Admin\AppData\Roaming\svchosts.exe
      "C:\Users\Admin\AppData\Roaming\svchosts.exe"
      2⤵
      • Executes dropped EXE
      PID:4408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchosts.exe

    Filesize

    11KB

    MD5

    6a4f3cd6f988e0d3bd196f5574f09f30

    SHA1

    6602cb29c8e7bc618f7f7d0f05534fdc3ef2a07f

    SHA256

    32e32e15e18b1e06066cbe0f6167c517959393dc869e100e42d263722a70ea80

    SHA512

    755c01bc2c4b8306906067e60fdab3845b05f2341c6751590c510902072629e8c4aaf97cd07cee92e47eca0d52b3163460ffdfc2f5b714f2df0fb6a1e8d14989

  • C:\Users\Admin\AppData\Roaming\svchosts.exe

    Filesize

    11KB

    MD5

    6a4f3cd6f988e0d3bd196f5574f09f30

    SHA1

    6602cb29c8e7bc618f7f7d0f05534fdc3ef2a07f

    SHA256

    32e32e15e18b1e06066cbe0f6167c517959393dc869e100e42d263722a70ea80

    SHA512

    755c01bc2c4b8306906067e60fdab3845b05f2341c6751590c510902072629e8c4aaf97cd07cee92e47eca0d52b3163460ffdfc2f5b714f2df0fb6a1e8d14989