Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe
Resource
win7-20221111-en
General
-
Target
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe
-
Size
226KB
-
MD5
cdd4c17bc79e0e111d637b515d7b20df
-
SHA1
6b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
-
SHA256
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
-
SHA512
d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
SSDEEP
6144:gpKes0N5fHjkaBQXjwwyJ4jmuv7nM12pzn:Xes0NtjNBNL4jV7n5
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2604 rovwer.exe 3168 rovwer.exe 3804 rovwer.exe 3880 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 1664 1196 WerFault.exe 84 116 3168 WerFault.exe 90 3228 3804 WerFault.exe 103 396 3880 WerFault.exe 111 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4776 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2604 1196 cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe 85 PID 1196 wrote to memory of 2604 1196 cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe 85 PID 1196 wrote to memory of 2604 1196 cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe 85 PID 2604 wrote to memory of 4776 2604 rovwer.exe 88 PID 2604 wrote to memory of 4776 2604 rovwer.exe 88 PID 2604 wrote to memory of 4776 2604 rovwer.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe"C:\Users\Admin\AppData\Local\Temp\cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 11362⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1196 -ip 11961⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 4162⤵
- Program crash
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3168 -ip 31681⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 4242⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3804 -ip 38041⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 4162⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3880 -ip 38801⤵PID:4400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
Filesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
Filesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
Filesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
Filesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed