Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 17:17

General

  • Target

    ad6a78957848e77722130fb2c10fde5e14cb5cd6c63ac8d48590161e853596af.exe

  • Size

    88KB

  • MD5

    936dcb2a7cec1b8c62404fb7f89d7671

  • SHA1

    f0ce1826b94be5694b4966570b7b29d4237bde53

  • SHA256

    ad6a78957848e77722130fb2c10fde5e14cb5cd6c63ac8d48590161e853596af

  • SHA512

    00d01efcf81fc511de6573cb91679ce78272fcb97b2f974f36f4bc9f2a5421fc87a40a1f676ec7e16161c6325f8001369900d87e11c6874e866a7c4effcdacf5

  • SSDEEP

    768:7LT9rFEGNu34C/lfQzxKztTp8KS5k+qIYvCdUwY7EqVN14+QCnq/K/7w:7LTsGGloAztd8HtPY7DN14Oqi/7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad6a78957848e77722130fb2c10fde5e14cb5cd6c63ac8d48590161e853596af.exe
    "C:\Users\Admin\AppData\Local\Temp\ad6a78957848e77722130fb2c10fde5e14cb5cd6c63ac8d48590161e853596af.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\jogod.exe
      "C:\Users\Admin\jogod.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jogod.exe

    Filesize

    88KB

    MD5

    6164bc5312d182d9a5044eafd957c9f6

    SHA1

    e34eb4dcf68578ea0f69f0f2afd3abbf18c5b420

    SHA256

    902737478342abbec14d951e5c4f0dfe4afdcb658a3e190ff4bb3cff22f01e0c

    SHA512

    63846b1833ee75906cc63e1e8f6351d35ee3b4db1a5ce44cc0967a87e55e06cea02c85f63d7302bb724767998b938c6d85033eacc3083872b45b54b7c7fd6601

  • C:\Users\Admin\jogod.exe

    Filesize

    88KB

    MD5

    6164bc5312d182d9a5044eafd957c9f6

    SHA1

    e34eb4dcf68578ea0f69f0f2afd3abbf18c5b420

    SHA256

    902737478342abbec14d951e5c4f0dfe4afdcb658a3e190ff4bb3cff22f01e0c

    SHA512

    63846b1833ee75906cc63e1e8f6351d35ee3b4db1a5ce44cc0967a87e55e06cea02c85f63d7302bb724767998b938c6d85033eacc3083872b45b54b7c7fd6601