Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe
Resource
win10v2004-20220812-en
General
-
Target
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe
-
Size
288KB
-
MD5
df4ed8f2643ccde6e0ea3168fc970352
-
SHA1
d19ca55618f10f30782e9ad3d02db508d9a22f54
-
SHA256
98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42
-
SHA512
f09c7e1ab0c8069c09c4e4df8cc8a6e5e5202fdf8020b3de9ec6a573030fbbc0b7d122c9d5c38367f40b836eda07c9dfdce3e361c9b90fdd68429fc1c390f3a6
-
SSDEEP
3072:Muu/BivfD+eQmQRnnYiXt5zy73xqGbN3S3LlXvja7Rm07FSx4hPvMmgNR:juZOfyHYiCnNsl7a045hPv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3548 Psqa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe -
Loads dropped DLL 2 IoCs
pid Process 4284 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 3548 Psqa.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\240572593\common\Utility.dll 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe File opened for modification C:\Program Files\240572593\common\RCXDA19.tmp 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe File created C:\Program Files\240572593\Psqa.exe 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4780 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3548 4284 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 81 PID 4284 wrote to memory of 3548 4284 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 81 PID 4284 wrote to memory of 3548 4284 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 81 PID 4284 wrote to memory of 4900 4284 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 82 PID 4284 wrote to memory of 4900 4284 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 82 PID 4284 wrote to memory of 4900 4284 98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe 82 PID 4900 wrote to memory of 4780 4900 cmd.exe 84 PID 4900 wrote to memory of 4780 4900 cmd.exe 84 PID 4900 wrote to memory of 4780 4900 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe"C:\Users\Admin\AppData\Local\Temp\98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\240572593\Psqa.exe"C:\Program Files\240572593\Psqa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3548
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\98a80feeb908523722549f44ab859b628c28e84ba0126f98b501e5d9f5b6fb42.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:4780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81.1MB
MD5399831f74a20dcfae8220afd497b5dd9
SHA16d75ee3e22a107b21bb43d20f4f5490b61fae183
SHA256bcac821384c93c4236b5e6b282387e99a411930d7be9550ff5afab2feef7c7d6
SHA512a4862be3d37b564875f583944c40569a53df98a4217e72dec6a7a0cff7abdf282f98192bd923bf9ff7b8d3280374a6843095979a9bfedb774df515536e0addb2
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
15KB
MD5c8c7f7472e5c059cbcc99d1eedd0d1ae
SHA110013a17639887f8c8ee2b37ec111352b9102832
SHA256066bd9a9e327df4422beb4922e49be328db8adc1b7c6fad7e4b5f1c47c5655c9
SHA51282762abeade3df840095f95f0559a1a6164e62bae3ff74e547df22dc59034b3ac65a540065aba2434798a6d3a8915ac455d564e0ab885333601fffa32e3272d0
-
Filesize
81.1MB
MD5399831f74a20dcfae8220afd497b5dd9
SHA16d75ee3e22a107b21bb43d20f4f5490b61fae183
SHA256bcac821384c93c4236b5e6b282387e99a411930d7be9550ff5afab2feef7c7d6
SHA512a4862be3d37b564875f583944c40569a53df98a4217e72dec6a7a0cff7abdf282f98192bd923bf9ff7b8d3280374a6843095979a9bfedb774df515536e0addb2
-
Filesize
81.1MB
MD5399831f74a20dcfae8220afd497b5dd9
SHA16d75ee3e22a107b21bb43d20f4f5490b61fae183
SHA256bcac821384c93c4236b5e6b282387e99a411930d7be9550ff5afab2feef7c7d6
SHA512a4862be3d37b564875f583944c40569a53df98a4217e72dec6a7a0cff7abdf282f98192bd923bf9ff7b8d3280374a6843095979a9bfedb774df515536e0addb2