Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe
Resource
win10v2004-20220901-en
General
-
Target
c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe
-
Size
221KB
-
MD5
596750f8bc7c1b8d15e2ed18995cb167
-
SHA1
a3adcd5f65d303a566206696ab4b02150a9ecc97
-
SHA256
c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9
-
SHA512
72f3ffde1db036fbdf1cbfabc5d7dd84f284f1607f60b9e8756be4106217a8cf1db003e3dbf86f9a593dea6f36f8c130eccfe662ef43514e64d327dd3ed282fb
-
SSDEEP
6144:pwHys8jsO3Mor+1MfgdCVtoAmNS3MECTphNDv3:SqsOTrEouCVtoq8ECTphN/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{7BCA0A03-511D-4D0B-B2EC-BDD1B53D7C7E}\\6815cdb9.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6815cdb9 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{7BCA0A03-511D-4D0B-B2EC-BDD1B53D7C7E}\\6815cdb9.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4864 set thread context of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe 2576 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2800 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 2800 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 4864 wrote to memory of 2800 4864 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 80 PID 2800 wrote to memory of 2576 2800 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 81 PID 2800 wrote to memory of 2576 2800 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 81 PID 2800 wrote to memory of 2576 2800 c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe"C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe"C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD58c31c49be6cbaeebcbf9704bb2ac9829
SHA18fb33105b56c1aa8f52ab661b8af14df8f2b3bd3
SHA256966569e692689d1c809168820db467d10d0cd53a70ac25969e2cd5221c99dec5
SHA512a39333d1d801eafe00abc406f6e08942dc6f32ab4a3c2368d3648cae28856786e20ae5f8769a04c40ef561d5c6c7f4eb0e70fd5124136113e595c47532be81bf