Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe
Resource
win10v2004-20220812-en
General
-
Target
4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe
-
Size
3.4MB
-
MD5
ab7c18ee7a0346e2a021b8da90af1e8c
-
SHA1
585967a65767e219f2dbdac89915dd660009a7e4
-
SHA256
4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16
-
SHA512
a22349b5af214f44e74446fc4c31f596603754a629a202668168961fcb06f93ac3ea1da1c5bf492098f81b1cc6188ed03e8bb22bdd7bdf46478fae268dd75d74
-
SSDEEP
98304:fz8zeiPaHnUXynSKnQp06VyVFkhsfCYSquB9MQvKoGBT8awTFLOAkGkzdnEVEFox:M8UXqQgFk2fABeoGBT8awTFLOyEFoKG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\sysWOW32 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3680 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe 3680 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe 3680 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe 3680 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3680 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4900 3680 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe 82 PID 3680 wrote to memory of 4900 3680 4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe"C:\Users\Admin\AppData\Local\Temp\4df24a46639d7d3b0290de70a7efc22ddf022c9d8411aa0c2fbb3b7548c14c16.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\killfile.bat" "2⤵PID:4900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301B
MD507bfbdef3da8bbc561e7f9e68e3197ca
SHA17549fece37d0ab49c9222d3f977cbd29cce6a06d
SHA2567d991721f260d3eb36d2101dbc5b509c91a6abe25db2eb8afdf1463734e567fd
SHA5122cf59b1e8256613c67db29d4ca25b7760d6294342119547d5b643efdbd52de2f0db89a5ecd20e6ac7bd800d3a4291c574306084d932b027a9d5292a27583371b