Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe
Resource
win10v2004-20220812-en
General
-
Target
a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe
-
Size
365KB
-
MD5
ee7d906ce2100fd7f0c7be70413b5494
-
SHA1
4f83ad1732f59f733d07d56b614963e0d38bed39
-
SHA256
a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743
-
SHA512
18ca5e7300ce177c86100aebcb64c858dbcc8c67c785823a28f66adcfd6549672529373a307e5effaa2be5102fd43a1061465a4d6d17a2c54bfc769e9cb90f1a
-
SSDEEP
6144:2Si07irC2F8NXC796TB9vj48UlL2XrzDcaTul3wMJInem5olCxjW:VDiZeVQkTrvj4sXrzDql16nBolX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4808 Smart.exe 212 Smart.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4808 set thread context of 212 4808 Smart.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4432 212 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4808 Smart.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3988 wrote to memory of 4808 3988 a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe 81 PID 3988 wrote to memory of 4808 3988 a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe 81 PID 3988 wrote to memory of 4808 3988 a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe 81 PID 4808 wrote to memory of 212 4808 Smart.exe 82 PID 4808 wrote to memory of 212 4808 Smart.exe 82 PID 4808 wrote to memory of 212 4808 Smart.exe 82 PID 4808 wrote to memory of 212 4808 Smart.exe 82 PID 4808 wrote to memory of 212 4808 Smart.exe 82 PID 4808 wrote to memory of 212 4808 Smart.exe 82 PID 4808 wrote to memory of 212 4808 Smart.exe 82 PID 4808 wrote to memory of 212 4808 Smart.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe"C:\Users\Admin\AppData\Local\Temp\a6ddba48ab18463bf8c6db4b8c06fbbd1d9d6f659ce3cb0ce954bfede9f94743.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Roaming\Smart-Services\Smart.exe"C:\Users\Admin\AppData\Roaming\Smart-Services\Smart.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\Smart-Services\Smart.exeC:\Users\Admin\AppData\Roaming\Smart-Services\Smart.exe3⤵
- Executes dropped EXE
PID:212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 124⤵
- Program crash
PID:4432
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 212 -ip 2121⤵PID:1860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD50298764dad6845747cbe2978a3f14acb
SHA1316f4f843f2b316f194232818e892e771621a661
SHA25683eb699d6d16558d49d985fc40aa62b5c8f71d34673f09250784dc6248093a82
SHA5127f3295f6b1e395719c0a9e9c78f151c6277eeea0f302e999d0ea097aefa36339af6c7b4b6143ae6b3bf83bc2188449937674bc8f6bcf583e27d204079ee7e72e
-
Filesize
291KB
MD50298764dad6845747cbe2978a3f14acb
SHA1316f4f843f2b316f194232818e892e771621a661
SHA25683eb699d6d16558d49d985fc40aa62b5c8f71d34673f09250784dc6248093a82
SHA5127f3295f6b1e395719c0a9e9c78f151c6277eeea0f302e999d0ea097aefa36339af6c7b4b6143ae6b3bf83bc2188449937674bc8f6bcf583e27d204079ee7e72e
-
Filesize
291KB
MD50298764dad6845747cbe2978a3f14acb
SHA1316f4f843f2b316f194232818e892e771621a661
SHA25683eb699d6d16558d49d985fc40aa62b5c8f71d34673f09250784dc6248093a82
SHA5127f3295f6b1e395719c0a9e9c78f151c6277eeea0f302e999d0ea097aefa36339af6c7b4b6143ae6b3bf83bc2188449937674bc8f6bcf583e27d204079ee7e72e