Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    163s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 22:33

General

  • Target

    dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3.exe

  • Size

    236KB

  • MD5

    49c178735198c595f7d0703357d3bc67

  • SHA1

    e890993ab06257bc681d30e7a011b2093fed67e7

  • SHA256

    dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3

  • SHA512

    86d5013acbe5b53203844dd5dc4d9fdfd845f0925731a669ef4176a6bf9c5f559f927e61be4a48ac359f9620c898b4cef1f3027d21260bb1de5ad80441bddae9

  • SSDEEP

    6144:bRiRAjjLPqKGaLCUI989H79t5LqRPqTmc4t2GXh+juOTXFo:diRAjjLPqKGaLCUI989H79t4lqV4tejU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3.exe
    "C:\Users\Admin\AppData\Local\Temp\dd508b1df6dc8352ec12b984483213b99a255a4e7da14e16ec0cd582a9fe12c3.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\qeikuuq.exe
      "C:\Users\Admin\qeikuuq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qeikuuq.exe

    Filesize

    236KB

    MD5

    b5676775a5d5ff7c0103a2c3b297edb1

    SHA1

    dc03c6b7b2dba330eb41d91b2ef837a18489a10b

    SHA256

    f8b4d08f6f5de776ff3fed57c9c800a8811a5f32c21dd711310319cc07634445

    SHA512

    371443113ffba872f87d2de922960571dcbb13563d953e619189e02f7fe04594bb53d5404ec72607a392403184c2616d2254509df4576142c62edca05521e66d

  • C:\Users\Admin\qeikuuq.exe

    Filesize

    236KB

    MD5

    b5676775a5d5ff7c0103a2c3b297edb1

    SHA1

    dc03c6b7b2dba330eb41d91b2ef837a18489a10b

    SHA256

    f8b4d08f6f5de776ff3fed57c9c800a8811a5f32c21dd711310319cc07634445

    SHA512

    371443113ffba872f87d2de922960571dcbb13563d953e619189e02f7fe04594bb53d5404ec72607a392403184c2616d2254509df4576142c62edca05521e66d