Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    174s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:54

General

  • Target

    e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a.exe

  • Size

    108KB

  • MD5

    91b3c57123c1058b91bc4b93261a3e47

  • SHA1

    c71d483852dcf3455c19c6bc3cc7d44ccaebadfb

  • SHA256

    e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a

  • SHA512

    f151a4111c8fe4bf322132aedea7183c0f8806a342c4e074ad306d6e05488a548c42eaf5602f927889b45fac9d4f98c0aae6de9c878416f24135edde36353f9b

  • SSDEEP

    1536:shycKiB6oQ7Lh5+sXmNt0ttiPXLq0zTrkB:ArmoIeZt1XTzToB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a.exe
    "C:\Users\Admin\AppData\Local\Temp\e1aa2a10af23c3a491aec090d2c5791e21590c1cbf707bf8994669ce7688f55a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Users\Admin\caohi.exe
      "C:\Users\Admin\caohi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\caohi.exe

    Filesize

    108KB

    MD5

    8bea8a04b4400bf1d6a6b46748e3330c

    SHA1

    8a1cbdbece7e5ad5e2e2e48d964d306c93dfe4ee

    SHA256

    6ef387f6e5fbb239fb90290add3057c34d78343e7dea8f1b5d95ab52e3e7abbd

    SHA512

    50e3a43dbc5eb3e5f7d454bf113117e91e2624bdd0e11313f98e9c44c1a4eee0c28e3f24570e5ee98aa3c02a8985c40fe519b6ff218cbb4152d3af5be5377e38

  • C:\Users\Admin\caohi.exe

    Filesize

    108KB

    MD5

    8bea8a04b4400bf1d6a6b46748e3330c

    SHA1

    8a1cbdbece7e5ad5e2e2e48d964d306c93dfe4ee

    SHA256

    6ef387f6e5fbb239fb90290add3057c34d78343e7dea8f1b5d95ab52e3e7abbd

    SHA512

    50e3a43dbc5eb3e5f7d454bf113117e91e2624bdd0e11313f98e9c44c1a4eee0c28e3f24570e5ee98aa3c02a8985c40fe519b6ff218cbb4152d3af5be5377e38