Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 05:26
Behavioral task
behavioral1
Sample
4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe
Resource
win10v2004-20220901-en
General
-
Target
4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe
-
Size
76KB
-
MD5
dd10395eceff485ad96f005cf5d6c41c
-
SHA1
f79881ecc934e9252c515e664de203339f8197a1
-
SHA256
4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d
-
SHA512
0d2464a773dfb0286c3632cc38b9ce978b362a29bbcd6b6de03354d61067f32f19ba9f696792860292acf089e5d9352f5eafefc61956889f0953886a9202ab5e
-
SSDEEP
1536:nsjlOrzYPT8kspp9zNtrIM1nC2719eJsQPNYmuSMoV1TlJe+:nsGzYPTJspp9zbrIM1C2feHlYmutovT7
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3496 8815.exe 3244 nsztsq.exe 4340 xzz.exe -
resource yara_rule behavioral2/memory/4376-132-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4376-143-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nsztsq.exe 8815.exe File opened for modification C:\Windows\SysWOW64\nsztsq.exe 8815.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsztsq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nsztsq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3496 8815.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3496 4376 4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe 82 PID 4376 wrote to memory of 3496 4376 4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe 82 PID 4376 wrote to memory of 3496 4376 4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe 82 PID 4376 wrote to memory of 4340 4376 4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe 83 PID 4376 wrote to memory of 4340 4376 4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe 83 PID 4376 wrote to memory of 4340 4376 4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe 83 PID 3496 wrote to memory of 3796 3496 8815.exe 85 PID 3496 wrote to memory of 3796 3496 8815.exe 85 PID 3496 wrote to memory of 3796 3496 8815.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe"C:\Users\Admin\AppData\Local\Temp\4501b6d2cc01bd22dc1b3d642c51e8102c8ed849f9d6375e518f7f48b45bc64d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe"C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\Temp\8815.exe > nul3⤵PID:3796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp\xzz.exe"C:\Users\Admin\AppData\Local\Temp\Temp\xzz.exe"2⤵
- Executes dropped EXE
PID:4340
-
-
C:\Windows\SysWOW64\nsztsq.exeC:\Windows\SysWOW64\nsztsq.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5b670560fd3fe66db6cbf3c3a09be99f6
SHA1e9b63396fcf4a3a919de4c4d8c700608dcdceb35
SHA2561cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4
SHA512d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199
-
Filesize
25KB
MD5b670560fd3fe66db6cbf3c3a09be99f6
SHA1e9b63396fcf4a3a919de4c4d8c700608dcdceb35
SHA2561cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4
SHA512d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199
-
Filesize
20KB
MD5800377675c1fdd298069fafd66bfeaab
SHA125e17dbc635ece894aa50877b171ae9f24c5c284
SHA256eb64c751cfa7b85b39b4ce9fbf68b033a0f8cddcb2dae1a2a0fb23f2997bff16
SHA512104fee08bc916205e7b3c0f5fa3f351c48777eaa768bea0eae54ee5a4e06577aec44143803f6808e82dd479a56d4d38eca3a134a68b8b86e1e4e1d3887fc6695
-
Filesize
20KB
MD5800377675c1fdd298069fafd66bfeaab
SHA125e17dbc635ece894aa50877b171ae9f24c5c284
SHA256eb64c751cfa7b85b39b4ce9fbf68b033a0f8cddcb2dae1a2a0fb23f2997bff16
SHA512104fee08bc916205e7b3c0f5fa3f351c48777eaa768bea0eae54ee5a4e06577aec44143803f6808e82dd479a56d4d38eca3a134a68b8b86e1e4e1d3887fc6695
-
Filesize
25KB
MD5b670560fd3fe66db6cbf3c3a09be99f6
SHA1e9b63396fcf4a3a919de4c4d8c700608dcdceb35
SHA2561cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4
SHA512d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199
-
Filesize
25KB
MD5b670560fd3fe66db6cbf3c3a09be99f6
SHA1e9b63396fcf4a3a919de4c4d8c700608dcdceb35
SHA2561cee12a950a28cbfc86cac1f33606e76372e36c31243bdff58e018a617058ee4
SHA512d3564f3a14ec58d4f30e6422d4a5a4632727c59a2fef6971b260f02ec1402c0b194eb48ad312e7863e57b0dfc3f127ea8e4d127a86bc6d1fc52adc48f6e51199