Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
185s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe
Resource
win10v2004-20221111-en
General
-
Target
dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe
-
Size
203KB
-
MD5
a64a7a2bbd294de605e480e82e810e12
-
SHA1
74b580ca5df6ed5eded2db28fd68ff8ec622584b
-
SHA256
dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e
-
SHA512
f40803559b60f4971e2c66baab4adf272100cea97a1dd3598b2d64110a192535aaaed9056f3a54551e5fca62d1fc30c2279f7fba0ccc49d38f923e70bea4193f
-
SSDEEP
3072:mBAp5XhKpN4eOyVTGfhEClj8jTk+0hu/MEPmWBMmvtGEcKJy9HnuthV9h+f2C8ws:dbXE9OiTGfhEClq9KEpf
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 16 1440 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ringoo ho kjsaq\nada rano vsavat\ee\lisape.for dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe File opened for modification C:\Program Files (x86)\ringoo ho kjsaq\nada rano vsavat\1ca0a320b7bd66069c01d79c71e2349.bat dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe File opened for modification C:\Program Files (x86)\ringoo ho kjsaq\nada rano vsavat\ee\63c4da4fde984fa5c719cdcf2147ab7f.vbs dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe File opened for modification C:\Program Files (x86)\ringoo ho kjsaq\nada rano vsavat\ee\87dba6b5e5e739d7a8506bbceb19e4be.vbs dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4596 wrote to memory of 1396 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 82 PID 4596 wrote to memory of 1396 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 82 PID 4596 wrote to memory of 1396 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 82 PID 4596 wrote to memory of 2656 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 84 PID 4596 wrote to memory of 2656 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 84 PID 4596 wrote to memory of 2656 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 84 PID 4596 wrote to memory of 1440 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 85 PID 4596 wrote to memory of 1440 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 85 PID 4596 wrote to memory of 1440 4596 dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe"C:\Users\Admin\AppData\Local\Temp\dfab8d3bd3b1ade1a6403cdcc8d73fa27b335269e3cf3d6175ef79a5034b024e.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\ringoo ho kjsaq\nada rano vsavat\1ca0a320b7bd66069c01d79c71e2349.bat" "2⤵
- Drops file in Drivers directory
PID:1396
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\ringoo ho kjsaq\nada rano vsavat\ee\63c4da4fde984fa5c719cdcf2147ab7f.vbs"2⤵
- Drops file in Drivers directory
PID:2656
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\ringoo ho kjsaq\nada rano vsavat\ee\87dba6b5e5e739d7a8506bbceb19e4be.vbs"2⤵
- Blocklisted process makes network request
PID:1440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c04b539be33c109c7974dfe480458eb2
SHA10da6d06a0ffad04fe8369c0cffeee318ec6ec7a8
SHA25629d1805746b9b341314389c94d8eab6fb2d52df6d818e8929f0fb5f4a01b9869
SHA512367c2fc078ebcf10c219466eea3f28b3b225d8a9d13dc8849767ae96e5446e9ab0e68fec7cb58bcbbec6c5aa9d4678d339b814968a76601388f7073a7ae4f5be
-
Filesize
645B
MD5f1c2725abff308321204f7c7af9d0847
SHA1267a4f927a0155d9bc452827ac3cc8687f8b2679
SHA2562d23da4aa09d962f0267e5a2457ce9d455cadbbd0718db85eb25683db49c01f8
SHA51201f948afa1de34547a981640e98323fabf0d140eb2d45b411cb5fcc374b3f50ca7689a93838de78722c8db80f4ac0ed252177d0322e3d211d634eba8d0909510
-
Filesize
508B
MD5eb7c1f72da88c64ecf316fe8616ae161
SHA1f18a5017c03282cdbe987ff9e5fba3d0b6443020
SHA25668a3b2be6b4357ded9a0c6378840124cc9602760f5a63c0f271d6cf07803de6b
SHA51218d0277e14de5d4f8b630ebb88a8453279e57237c079494bf15e32a7b407baa48d837dd735506e5e08b232895105a65de90a87dbc45679b1a023a5513416bd2f
-
Filesize
91B
MD5e311d9b0347d0541839ff7059ec6198a
SHA132a79e69e505825e7f1d12e9a1b93f7e69aabb6d
SHA2564a44b6975f80d5245fbed7b3ad0878945547909fbc63675fb36a26d22a499a34
SHA5125cd30ba05f82ef9fdcd5440f61190e4d413acda32f487648de615dc7e82a88275b3abb476c99232be5ac09eef41e970f87acfc8bf3fabb7a9504cb20295fd2ff
-
Filesize
1KB
MD582cc956e1637519e96659ded66901bee
SHA1594e335fceb0750f6dc0f829711561c409e31349
SHA25693a3aa656bc826adbc150be1c8ee3a85c905185cdac9b2dafbc4fbabb1709062
SHA512e7317849c6dd74bc197a1722ddf8485dff2332372b384bea9760671633237295ecbe29505dc7db508b41bc4e99b58473ef7fea7818e50348ecf676a3420712b7