Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe
Resource
win10v2004-20220901-en
General
-
Target
19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe
-
Size
1.4MB
-
MD5
ce5657148b94e8dd7f0e28a16cd4452a
-
SHA1
100a4b708407191204b856688e1a16adafc01601
-
SHA256
19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad
-
SHA512
9ed10e7d1e00e7923cd69f02381d811eef596dcea765ac69af25c27789a3aa9ef8de5f71c80df35ade015d7dbf155a578e95a5260a9901c8507ae3ebdc52f0ca
-
SSDEEP
24576:sbkR/czvmzHeeFlEq18P0YtcFerXc064b:sbw/czvmzHo6D4b
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeSecurityPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeTakeOwnershipPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeLoadDriverPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeSystemProfilePrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeSystemtimePrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeProfSingleProcessPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeIncBasePriorityPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeCreatePagefilePrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeBackupPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeRestorePrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeShutdownPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeDebugPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeSystemEnvironmentPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeChangeNotifyPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeRemoteShutdownPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeUndockPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeManageVolumePrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeImpersonatePrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: SeCreateGlobalPrivilege 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: 33 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: 34 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: 35 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe Token: 36 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe"C:\Users\Admin\AppData\Local\Temp\19439f0f08fe2bda8bb58a61a4f5c6475f10d83eec1467dae88ac516910280ad.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1996