Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 13:55

General

  • Target

    19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe

  • Size

    1.4MB

  • MD5

    ce5657148b94e8dd7f0e28a16cd4452a

  • SHA1

    100a4b708407191204b856688e1a16adafc01601

  • SHA256

    19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad

  • SHA512

    9ed10e7d1e00e7923cd69f02381d811eef596dcea765ac69af25c27789a3aa9ef8de5f71c80df35ade015d7dbf155a578e95a5260a9901c8507ae3ebdc52f0ca

  • SSDEEP

    24576:sbkR/czvmzHeeFlEq18P0YtcFerXc064b:sbw/czvmzHo6D4b

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe
    "C:\Users\Admin\AppData\Local\Temp\19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1996-132-0x00000000022E0000-0x000000000236E000-memory.dmp

    Filesize

    568KB

  • memory/1996-133-0x0000000000400000-0x0000000000567000-memory.dmp

    Filesize

    1.4MB

  • memory/1996-134-0x00000000022E0000-0x000000000236E000-memory.dmp

    Filesize

    568KB

  • memory/1996-135-0x00000000022E0000-0x00000000022E5000-memory.dmp

    Filesize

    20KB

  • memory/1996-136-0x0000000000400000-0x0000000000567000-memory.dmp

    Filesize

    1.4MB

  • memory/1996-137-0x00000000022E0000-0x000000000236E000-memory.dmp

    Filesize

    568KB

  • memory/1996-138-0x00000000022E0000-0x00000000022E5000-memory.dmp

    Filesize

    20KB

  • memory/1996-139-0x0000000000400000-0x0000000000567000-memory.dmp

    Filesize

    1.4MB