Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    188s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 03:04

General

  • Target

    2ae89fab0ddc51b77419da145a7a402eed470dbe8a7667c2a548370aba6da024.exe

  • Size

    228KB

  • MD5

    1eb97d2d7059bf753e453426a4c28c20

  • SHA1

    04bd9737cc8f173a2955b49fdccee742d2e9413d

  • SHA256

    2ae89fab0ddc51b77419da145a7a402eed470dbe8a7667c2a548370aba6da024

  • SHA512

    08388486fee26fb7011a2d0e112e2763c3c327e61472729a10b9b8a0422e7da274e56634da71316e474f092e3578007a50c442c23a58300f57725fe8b3439f13

  • SSDEEP

    6144:Zmua3PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/aSd:ZmuoPhAmZIH+aA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ae89fab0ddc51b77419da145a7a402eed470dbe8a7667c2a548370aba6da024.exe
    "C:\Users\Admin\AppData\Local\Temp\2ae89fab0ddc51b77419da145a7a402eed470dbe8a7667c2a548370aba6da024.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Users\Admin\dauoniy.exe
      "C:\Users\Admin\dauoniy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\dauoniy.exe

    Filesize

    228KB

    MD5

    2de84f8b144a3409b6d0d14fddad0266

    SHA1

    e6d8593574dadce5a2ae699006f25c235bd045a2

    SHA256

    6dea562f919c5339240127cf248f5bfd785ef809a5aec2e016897272ffd590c7

    SHA512

    563d8d6ab67cc4eef837f93e256297fe64717a1167c6c1f12ac242b741be55300e3efa33ae61b1342599073036616e1b7f86fb87150ee4e2df63ffc86bf3ead8

  • C:\Users\Admin\dauoniy.exe

    Filesize

    228KB

    MD5

    2de84f8b144a3409b6d0d14fddad0266

    SHA1

    e6d8593574dadce5a2ae699006f25c235bd045a2

    SHA256

    6dea562f919c5339240127cf248f5bfd785ef809a5aec2e016897272ffd590c7

    SHA512

    563d8d6ab67cc4eef837f93e256297fe64717a1167c6c1f12ac242b741be55300e3efa33ae61b1342599073036616e1b7f86fb87150ee4e2df63ffc86bf3ead8