Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 15:33

General

  • Target

    2c44b9dfaf73d54ec34479ca3bf3c972672af62c10c134911fd6042f067aab59.exe

  • Size

    1.6MB

  • MD5

    370223f429c741800b0e645662f2ec44

  • SHA1

    9ae49e07f2f20224862fb88a44c7ea07a251636c

  • SHA256

    2c44b9dfaf73d54ec34479ca3bf3c972672af62c10c134911fd6042f067aab59

  • SHA512

    3b2431acc3e71bfc1b24a102b366f9d2d630a182c21e29293538fda721a8eb6ed9aace6b5a1ff37646fcf140baf80b6101cd4adf5344a909a48c9f39e6d291fc

  • SSDEEP

    24576:DJf0o2gDZATBBsHeQGZfkRq2WBwjWeVdzZPQes+Th/7w74J6J:DzATGZlEeVbb/7w74J6J

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c44b9dfaf73d54ec34479ca3bf3c972672af62c10c134911fd6042f067aab59.exe
    "C:\Users\Admin\AppData\Local\Temp\2c44b9dfaf73d54ec34479ca3bf3c972672af62c10c134911fd6042f067aab59.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.xiugua.net/wg/dnf/20130121/1754.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4068 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3504
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f8 0x2fc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    2385a464e17980d978246b6b59a60697

    SHA1

    ee57c16c00972abbea042066dbdd769fdb89571b

    SHA256

    88dabd9b9c2183dd69b01146358783b0dc0e24faf044331be565cfd26e1dee2a

    SHA512

    d85eaa2a9a0a4523eb87bd43bbe995d8658dce705024c316de12c9f9be0277ded1646a6667bd47eed337e2b790aab9760ddf2e501242c42f3d66f40c23042d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    d8ae1d8679da325d25332016379d9531

    SHA1

    8ccf8aaa6269af387d014489a3962e39459a5c6b

    SHA256

    decaa065a7e4f114ce56c8ac858cc5dd65b58bc3dd298a1310fe0f9b2387af24

    SHA512

    47d1c19d21f53568598c90d79e60ed925235cdf620543af9cced2261c03f90073dc4bdecf5d89365976e699335fcf930b8ddd571a7ed98f4627318e23b89cf75

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

    Filesize

    4KB

    MD5

    7c91f0f837e3fa1ead8cda7fb4728c90

    SHA1

    f5b877dfffd6a01e17f03c93118a0ef65aa3bddd

    SHA256

    2500c704b65e76507e90261b7162a716c2830ca74c869cd03be04c7b929089e8

    SHA512

    79e5843d6561a2d1cea2d941ff5cbade250c6ffd477a08a6754a28ca27058bed27a13901f13cdb555c1f39e45e6d683eea92312d7efacd7ff8d12e63e242effc