Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe
Resource
win10v2004-20220901-en
General
-
Target
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe
-
Size
5.4MB
-
MD5
b496894b974411248daf6037c248d1f4
-
SHA1
548b434ab70b27849d8811a8efde1e1094f3b6fa
-
SHA256
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd
-
SHA512
0c9db137a85e2bc94ca1d0fd03374c5db953474ef9a25f02220e64a906e9451365d5c5e2904e7ffc3dd2fd05c1a2bed40e7477ff6c7b731dcbb727e7de02ffb2
-
SSDEEP
98304:jE1bnVjJWwuuKrJpVzGVvWJ/PqFgA9/BDI0ggP:41bV+uGVwOJqSoZE0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 4220 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 476 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 476 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 476 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 476 wrote to memory of 4208 476 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 76 PID 476 wrote to memory of 4208 476 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 76 PID 476 wrote to memory of 4208 476 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 76 PID 4208 wrote to memory of 4220 4208 cmd.exe 78 PID 4208 wrote to memory of 4220 4208 cmd.exe 78 PID 4208 wrote to memory of 4220 4208 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe"C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im3⤵
- Kills process with taskkill
PID:4220
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.bat
Filesize364B
MD505f75049b4a7673afd910dc109683d1b
SHA1dc0fd87ec1da928e8b4a9fa339c7545b2a67fa25
SHA2566017ada26f10202e3cec13629777f0e575fd96f3c047f07c2bb00c47d0292891
SHA51265d5a520f4514fe0e4525a9f422a807e8f449c30acf0bef497b8ef580ed3f5fc6724588c8b2603277f5044d834c28138792516c41ad07021de708666bf9f7d7e