Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    165s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:27

General

  • Target

    8a86262f2f0a8924f499900f7695bb8e659b549c05dff658205b710d2308bac0.exe

  • Size

    657KB

  • MD5

    71f5cd3dd572d5147962eea9d22e2b9e

  • SHA1

    b81eaf651d7aa70bf700a444e66c3ce47343a89c

  • SHA256

    8a86262f2f0a8924f499900f7695bb8e659b549c05dff658205b710d2308bac0

  • SHA512

    f44d81eb083f0f4600876c77ca80019a820fd8cbcb36ee7fab7e09db893d1bc5c73213d3d5d3e37dac683b8adb6b231954729162a0737e49d561e60b464696cb

  • SSDEEP

    12288:g72bnueKBLWoD1+OteKIjX9aTQT5Hk45QRbaxlwfCGWPI/D+WC:g72zDKFD1e9UDq

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 4 IoCs
  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a86262f2f0a8924f499900f7695bb8e659b549c05dff658205b710d2308bac0.exe
    "C:\Users\Admin\AppData\Local\Temp\8a86262f2f0a8924f499900f7695bb8e659b549c05dff658205b710d2308bac0.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Windows\SysWOW64\REG.exe
      REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
      2⤵
      • Modifies registry key
      PID:1596
    • C:\Users\Admin\AppData\Local\Temp\avscan.exe
      C:\Users\Admin\AppData\Local\Temp\avscan.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Users\Admin\AppData\Local\Temp\avscan.exe
        C:\Users\Admin\AppData\Local\Temp\avscan.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3448
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat
        3⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\windows\hosts.exe
          C:\windows\hosts.exe
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Users\Admin\AppData\Local\Temp\avscan.exe
            C:\Users\Admin\AppData\Local\Temp\avscan.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2204
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat
            5⤵
            • Checks computer location settings
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2744
            • C:\windows\hosts.exe
              C:\windows\hosts.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:532
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
              6⤵
              • Adds policy Run key to start application
              PID:972
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:616
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:4056
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:4636
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:796
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
          4⤵
          • Adds policy Run key to start application
          PID:4772
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:3340
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:3668
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:2124
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:712
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\windows\hosts.exe
        C:\windows\hosts.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2872
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
        3⤵
        • Adds policy Run key to start application
        PID:3504
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2056

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\avscan.exe

      Filesize

      657KB

      MD5

      8f86ee2d999a0d5d1d57190625b026f4

      SHA1

      e366e93b062ce686f6e980b0dd92e81bb10a2f61

      SHA256

      7efe944c946c104fc491109983b76ad17b2ba12641314ef221d965c649ca5f15

      SHA512

      0738631bbb2fb2ecb34e3578b15e8680abd6d756b12dc2b461becbb08491f368ebe04308c6c1de60b5946df0c278488bce95036feb179389ff573ce2d1b1d1bf

    • C:\Users\Admin\AppData\Local\Temp\avscan.exe

      Filesize

      657KB

      MD5

      8f86ee2d999a0d5d1d57190625b026f4

      SHA1

      e366e93b062ce686f6e980b0dd92e81bb10a2f61

      SHA256

      7efe944c946c104fc491109983b76ad17b2ba12641314ef221d965c649ca5f15

      SHA512

      0738631bbb2fb2ecb34e3578b15e8680abd6d756b12dc2b461becbb08491f368ebe04308c6c1de60b5946df0c278488bce95036feb179389ff573ce2d1b1d1bf

    • C:\Users\Admin\AppData\Local\Temp\avscan.exe

      Filesize

      657KB

      MD5

      8f86ee2d999a0d5d1d57190625b026f4

      SHA1

      e366e93b062ce686f6e980b0dd92e81bb10a2f61

      SHA256

      7efe944c946c104fc491109983b76ad17b2ba12641314ef221d965c649ca5f15

      SHA512

      0738631bbb2fb2ecb34e3578b15e8680abd6d756b12dc2b461becbb08491f368ebe04308c6c1de60b5946df0c278488bce95036feb179389ff573ce2d1b1d1bf

    • C:\Users\Admin\AppData\Local\Temp\avscan.exe

      Filesize

      657KB

      MD5

      8f86ee2d999a0d5d1d57190625b026f4

      SHA1

      e366e93b062ce686f6e980b0dd92e81bb10a2f61

      SHA256

      7efe944c946c104fc491109983b76ad17b2ba12641314ef221d965c649ca5f15

      SHA512

      0738631bbb2fb2ecb34e3578b15e8680abd6d756b12dc2b461becbb08491f368ebe04308c6c1de60b5946df0c278488bce95036feb179389ff573ce2d1b1d1bf

    • C:\Windows\W_X_C.vbs

      Filesize

      195B

      MD5

      b53e5ef6d903f57c7c038b3d3d3db0cb

      SHA1

      57f5ec8ae3c79e86657ca29d4463ee475becf39b

      SHA256

      a04a3493a1c2d3d58fc9180512aed93cff63f94c2202f1ce9d62c1c7d82b8d0a

      SHA512

      603af007038ea2416d7616c38cf020d985f0498955e37c8270fd1b0c4fafa70b1e7c927a5d21d659717e2a6382bb7038711c6bf7a8b9ce1e1d2a9a3cf4a955cf

    • C:\Windows\hosts.exe

      Filesize

      657KB

      MD5

      2fa2cd2d009cf91ef436ce15d7bee1db

      SHA1

      f68a6c340915e3e7e4a0598ae405ebf90f40b9bc

      SHA256

      3d217e11dbec507f5ea932c6136622b5d7817c4cb3d5ad4614d67f22f5a342ea

      SHA512

      15d6db76407bd7baa0b225c1ca429ec67d48ffc28051a4a34d09ff7af6a5030f1e7533a4bcbd07a8d81d1c80bbc984bd9072dd47574228bc477ba1e484f7d011

    • C:\Windows\hosts.exe

      Filesize

      657KB

      MD5

      2fa2cd2d009cf91ef436ce15d7bee1db

      SHA1

      f68a6c340915e3e7e4a0598ae405ebf90f40b9bc

      SHA256

      3d217e11dbec507f5ea932c6136622b5d7817c4cb3d5ad4614d67f22f5a342ea

      SHA512

      15d6db76407bd7baa0b225c1ca429ec67d48ffc28051a4a34d09ff7af6a5030f1e7533a4bcbd07a8d81d1c80bbc984bd9072dd47574228bc477ba1e484f7d011

    • C:\Windows\hosts.exe

      Filesize

      657KB

      MD5

      2fa2cd2d009cf91ef436ce15d7bee1db

      SHA1

      f68a6c340915e3e7e4a0598ae405ebf90f40b9bc

      SHA256

      3d217e11dbec507f5ea932c6136622b5d7817c4cb3d5ad4614d67f22f5a342ea

      SHA512

      15d6db76407bd7baa0b225c1ca429ec67d48ffc28051a4a34d09ff7af6a5030f1e7533a4bcbd07a8d81d1c80bbc984bd9072dd47574228bc477ba1e484f7d011

    • C:\Windows\hosts.exe

      Filesize

      657KB

      MD5

      2fa2cd2d009cf91ef436ce15d7bee1db

      SHA1

      f68a6c340915e3e7e4a0598ae405ebf90f40b9bc

      SHA256

      3d217e11dbec507f5ea932c6136622b5d7817c4cb3d5ad4614d67f22f5a342ea

      SHA512

      15d6db76407bd7baa0b225c1ca429ec67d48ffc28051a4a34d09ff7af6a5030f1e7533a4bcbd07a8d81d1c80bbc984bd9072dd47574228bc477ba1e484f7d011

    • C:\windows\hosts.exe

      Filesize

      657KB

      MD5

      2fa2cd2d009cf91ef436ce15d7bee1db

      SHA1

      f68a6c340915e3e7e4a0598ae405ebf90f40b9bc

      SHA256

      3d217e11dbec507f5ea932c6136622b5d7817c4cb3d5ad4614d67f22f5a342ea

      SHA512

      15d6db76407bd7baa0b225c1ca429ec67d48ffc28051a4a34d09ff7af6a5030f1e7533a4bcbd07a8d81d1c80bbc984bd9072dd47574228bc477ba1e484f7d011

    • \??\c:\windows\W_X_C.bat

      Filesize

      336B

      MD5

      4db9f8b6175722b62ececeeeba1ce307

      SHA1

      3b3ba8414706e72a6fa19e884a97b87609e11e47

      SHA256

      d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78

      SHA512

      1d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b