Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
212s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe
Resource
win10v2004-20220812-en
General
-
Target
f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe
-
Size
645KB
-
MD5
eddb82bbad579385c225abd94591b56f
-
SHA1
27a588a4770aa301546157a3afcd3abe8f8a5c61
-
SHA256
f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0
-
SHA512
ca23e237d3b9fb2ebe82b4451a254db8d89383eee3e30f348f96860ad0dea8a3c1d64bcd7ad7bc573c974b24c884dfbe33e541ac5c73ec677e69dbc6c4589a5b
-
SSDEEP
1536:3v+gWn0/aKcTnbrGUfiZN5CfIUQ6rvOgOZlk9I/+kcg3Fteso7oJ9uuaxsp9OiSG:TWuaKcTOMIcvgfRwkjMFNTS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1408 usersint.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7880F99D-BC3G-14DF-89AS-1190DR808E85} f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7880F99D-BC3G-14DF-89AS-1190DR808E85}\StubPath = "C:\\Windows\\system32\\usersint.exe" f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe -
Loads dropped DLL 2 IoCs
pid Process 1408 usersint.exe 1408 usersint.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\usersint.exe f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe File opened for modification C:\Windows\SysWOW64\usersint.exe f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1408 set thread context of 4156 1408 usersint.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4884 4156 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1408 usersint.exe 1408 usersint.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4156 userinit.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1408 1144 f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe 79 PID 1144 wrote to memory of 1408 1144 f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe 79 PID 1144 wrote to memory of 1408 1144 f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe 79 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80 PID 1408 wrote to memory of 4156 1408 usersint.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe"C:\Users\Admin\AppData\Local\Temp\f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\usersint.exe"C:\Windows\system32\usersint.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\userinit.exe"C:\Windows\system32\userinit.exe"3⤵
- Suspicious use of UnmapMainImage
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 124⤵
- Program crash
PID:4884
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4156 -ip 41561⤵PID:3824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645KB
MD5eddb82bbad579385c225abd94591b56f
SHA127a588a4770aa301546157a3afcd3abe8f8a5c61
SHA256f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0
SHA512ca23e237d3b9fb2ebe82b4451a254db8d89383eee3e30f348f96860ad0dea8a3c1d64bcd7ad7bc573c974b24c884dfbe33e541ac5c73ec677e69dbc6c4589a5b
-
Filesize
645KB
MD5eddb82bbad579385c225abd94591b56f
SHA127a588a4770aa301546157a3afcd3abe8f8a5c61
SHA256f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0
SHA512ca23e237d3b9fb2ebe82b4451a254db8d89383eee3e30f348f96860ad0dea8a3c1d64bcd7ad7bc573c974b24c884dfbe33e541ac5c73ec677e69dbc6c4589a5b
-
Filesize
645KB
MD5eddb82bbad579385c225abd94591b56f
SHA127a588a4770aa301546157a3afcd3abe8f8a5c61
SHA256f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0
SHA512ca23e237d3b9fb2ebe82b4451a254db8d89383eee3e30f348f96860ad0dea8a3c1d64bcd7ad7bc573c974b24c884dfbe33e541ac5c73ec677e69dbc6c4589a5b
-
Filesize
645KB
MD5eddb82bbad579385c225abd94591b56f
SHA127a588a4770aa301546157a3afcd3abe8f8a5c61
SHA256f2ab7b7a117fbd1776a302ff278ca011fcc2307d85108945b21a08d4984ffdd0
SHA512ca23e237d3b9fb2ebe82b4451a254db8d89383eee3e30f348f96860ad0dea8a3c1d64bcd7ad7bc573c974b24c884dfbe33e541ac5c73ec677e69dbc6c4589a5b