Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe
Resource
win7-20221111-en
General
-
Target
f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe
-
Size
271KB
-
MD5
1d7157ce34d0baa57e684f95ead52605
-
SHA1
0484af353cf88f3eaae5c77eccdcfec869842f9c
-
SHA256
f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e
-
SHA512
015f2231bed0cbfb8352dbda4ff3a1530ec93fccc77a8e562a09c70692c600c296d31b6bb68f7aebcef748e8a1db9cef1580b8366e35f90cda36ac11f1b970cc
-
SSDEEP
6144:20SEiYbEZSPNYslw+67yVWenNFNRCbsMtun9zBPLctlU:XSEiOAoNy+IyVWQ3NelaBzIU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1344 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe File opened for modification C:\Windows\assembly\Desktop.ini f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe File created C:\Windows\assembly\Desktop.ini f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe File opened for modification C:\Windows\assembly\Desktop.ini f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1104 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1344 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4844 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe Token: SeDebugPrivilege 1344 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe Token: SeDebugPrivilege 1344 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1344 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4844 wrote to memory of 1344 4844 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe 80 PID 4844 wrote to memory of 1344 4844 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe 80 PID 4844 wrote to memory of 1344 4844 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe 80 PID 4844 wrote to memory of 4528 4844 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe 81 PID 4844 wrote to memory of 4528 4844 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe 81 PID 4844 wrote to memory of 4528 4844 f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe 81 PID 4528 wrote to memory of 1104 4528 cmd.exe 83 PID 4528 wrote to memory of 1104 4528 cmd.exe 83 PID 4528 wrote to memory of 1104 4528 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe"C:\Users\Admin\AppData\Local\Temp\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe"C:\Users\Admin\AppData\Local\Temp\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1104
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe
Filesize271KB
MD51d7157ce34d0baa57e684f95ead52605
SHA10484af353cf88f3eaae5c77eccdcfec869842f9c
SHA256f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e
SHA512015f2231bed0cbfb8352dbda4ff3a1530ec93fccc77a8e562a09c70692c600c296d31b6bb68f7aebcef748e8a1db9cef1580b8366e35f90cda36ac11f1b970cc
-
C:\Users\Admin\AppData\Local\Temp\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e\f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e.exe
Filesize271KB
MD51d7157ce34d0baa57e684f95ead52605
SHA10484af353cf88f3eaae5c77eccdcfec869842f9c
SHA256f452261adf2c73deddc37ef1013a5bbda5db4cd7b22e86b669ca7acd54a2d88e
SHA512015f2231bed0cbfb8352dbda4ff3a1530ec93fccc77a8e562a09c70692c600c296d31b6bb68f7aebcef748e8a1db9cef1580b8366e35f90cda36ac11f1b970cc