Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    192s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:39

General

  • Target

    e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe

  • Size

    232KB

  • MD5

    2552f83dae1f44361948fb1d67585eab

  • SHA1

    c773cded8fd60ed04dd2d5ed5a4ea415d9d9e115

  • SHA256

    e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8

  • SHA512

    c6a24a15614eb50c6430bba64317aa50a3a9bd503fdb77c1f6f53d663cfd6a2769a563a61bc86489876980d922969be66bcd16b1c54c9d55a3fdbec023845376

  • SSDEEP

    3072:XN1ZfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MCixqiD8RUy3eL2mDH7z/5L5Jsr6N:XNPepp3PJXCOGY3efxq5OyW9L5Jsr6U

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe
    "C:\Users\Admin\AppData\Local\Temp\e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\jgbiav.exe
      "C:\Users\Admin\jgbiav.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jgbiav.exe

    Filesize

    232KB

    MD5

    713dd963e572f4b47317f5f39237e429

    SHA1

    76a845ab74b7210729d00e9df6d2ffb5de3090ef

    SHA256

    b8c86799a02fc6d4714dd9595eef4c314b1d9ab71c2ce88f73d96c2dbf3beda7

    SHA512

    3330eee1a22271698f6eb329432cd3263246778d50b6e902db8fea250f7b301933a5c5d9a3ecd04a95c6fd30d9ee3ed57acb2b24fe99c6e0640efc0703ddb6be

  • C:\Users\Admin\jgbiav.exe

    Filesize

    232KB

    MD5

    713dd963e572f4b47317f5f39237e429

    SHA1

    76a845ab74b7210729d00e9df6d2ffb5de3090ef

    SHA256

    b8c86799a02fc6d4714dd9595eef4c314b1d9ab71c2ce88f73d96c2dbf3beda7

    SHA512

    3330eee1a22271698f6eb329432cd3263246778d50b6e902db8fea250f7b301933a5c5d9a3ecd04a95c6fd30d9ee3ed57acb2b24fe99c6e0640efc0703ddb6be