Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 05:26

General

  • Target

    4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe

  • Size

    76KB

  • MD5

    dd10395eceff485ad96f005cf5d6c41c

  • SHA1

    f79881ecc934e9252c515e664de203339f8197a1

  • SHA256

    4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d

  • SHA512

    0d2464a773dfb0286c3632cc38b9ce978b362a29bbcd6b6de03354d61067f32f19ba9f696792860292acf089e5d9352f5eafefc61956889f0953886a9202ab5e

  • SSDEEP

    1536:nsjlOrzYPT8kspp9zNtrIM1nC2719eJsQPNYmuSMoV1TlJe+:nsGzYPTJspp9zbrIM1C2feHlYmutovT7

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe
    "C:\Users\Admin\AppData\Local\Temp\4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe > nul
        3⤵
          PID:3796
      • C:\Users\Admin\AppData\Local\Temp\Temp\xzz.exe
        "C:\Users\Admin\AppData\Local\Temp\Temp\xzz.exe"
        2⤵
        • Executes dropped EXE
        PID:4340
    • C:\Windows\SysWOW64\nsztsq.exe
      C:\Windows\SysWOW64\nsztsq.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:3244

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe

      Filesize

      25KB

      MD5

      b670560fd3fe66db6cbf3c3a09be99f6

      SHA1

      e9b63396fcf4a3a919de4c4d8c700608dcdceb35

      SHA256

      1cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4

      SHA512

      d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199

    • C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe

      Filesize

      25KB

      MD5

      b670560fd3fe66db6cbf3c3a09be99f6

      SHA1

      e9b63396fcf4a3a919de4c4d8c700608dcdceb35

      SHA256

      1cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4

      SHA512

      d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199

    • C:\Users\Admin\AppData\Local\Temp\Temp\xzz.exe

      Filesize

      20KB

      MD5

      800377675c1fdd298069fafd66bfeaab

      SHA1

      25e17dbc635ece894aa50877b171ae9f24c5c284

      SHA256

      eb64c751cfa7b85b39b4ce9fbf68b033a0f8cddcb2dae1a2a0fb23f2997bff16

      SHA512

      104fee08bc916205e7b3c0f5fa3f351c48777eaa768bea0eae54ee5a4e06577aec44143803f6808e82dd479a56d4d38eca3a134a68b8b86e1e4e1d3887fc6695

    • C:\Users\Admin\AppData\Local\Temp\Temp\xzz.exe

      Filesize

      20KB

      MD5

      800377675c1fdd298069fafd66bfeaab

      SHA1

      25e17dbc635ece894aa50877b171ae9f24c5c284

      SHA256

      eb64c751cfa7b85b39b4ce9fbf68b033a0f8cddcb2dae1a2a0fb23f2997bff16

      SHA512

      104fee08bc916205e7b3c0f5fa3f351c48777eaa768bea0eae54ee5a4e06577aec44143803f6808e82dd479a56d4d38eca3a134a68b8b86e1e4e1d3887fc6695

    • C:\Windows\SysWOW64\nsztsq.exe

      Filesize

      25KB

      MD5

      b670560fd3fe66db6cbf3c3a09be99f6

      SHA1

      e9b63396fcf4a3a919de4c4d8c700608dcdceb35

      SHA256

      1cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4

      SHA512

      d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199

    • C:\Windows\SysWOW64\nsztsq.exe

      Filesize

      25KB

      MD5

      b670560fd3fe66db6cbf3c3a09be99f6

      SHA1

      e9b63396fcf4a3a919de4c4d8c700608dcdceb35

      SHA256

      1cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4

      SHA512

      d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199

    • memory/4340-142-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4340-144-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4340-145-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4376-132-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4376-143-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB