Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 22:47

General

  • Target

    bb8b46dd59001b84f72a65bc93f40e38a9efe21cb8b20ae9d92999ea86009929.exe

  • Size

    248KB

  • MD5

    b43a81fea8adba145c3afb9aebc5ca0a

  • SHA1

    64e72ed7ae7de7e865fc20f90ca9acfe42a61a74

  • SHA256

    bb8b46dd59001b84f72a65bc93f40e38a9efe21cb8b20ae9d92999ea86009929

  • SHA512

    27ac3c69b2e7db7b81314ddaa5bdee0288d2ff4cc3587de8c9264be6ec3de084ab0af8c311ca5330f7f1672bbf691b56fb46c482d26e7190c685fdbe548fb1aa

  • SSDEEP

    6144:wKB56UxwGQpNnVN8KqzeLM+8MvrLHHx5SQlibjXGWNkolay4p4bH8uO:uHpNnlPICrDS0ibLG/l

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb8b46dd59001b84f72a65bc93f40e38a9efe21cb8b20ae9d92999ea86009929.exe
    "C:\Users\Admin\AppData\Local\Temp\bb8b46dd59001b84f72a65bc93f40e38a9efe21cb8b20ae9d92999ea86009929.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\tuoaci.exe
      "C:\Users\Admin\tuoaci.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tuoaci.exe

    Filesize

    248KB

    MD5

    ebdb7c70b33745803437d6dfcf67382b

    SHA1

    9e2b4796783a4bb41dc38a0eeff8051e9c9cf50a

    SHA256

    475da5cfe2272a5de2232b92b41b4d52dcf9d5c744b8861a3c59298cdfab9ce9

    SHA512

    dc3dcc13328aca4f81b7998fbd7ca2437cfe6716bcaa686245fc3e2aa7c8ce40754348e723fac192b9f63fd89f0f5fe54bc599331ddc87fec8f028e63ce2f973

  • C:\Users\Admin\tuoaci.exe

    Filesize

    248KB

    MD5

    ebdb7c70b33745803437d6dfcf67382b

    SHA1

    9e2b4796783a4bb41dc38a0eeff8051e9c9cf50a

    SHA256

    475da5cfe2272a5de2232b92b41b4d52dcf9d5c744b8861a3c59298cdfab9ce9

    SHA512

    dc3dcc13328aca4f81b7998fbd7ca2437cfe6716bcaa686245fc3e2aa7c8ce40754348e723fac192b9f63fd89f0f5fe54bc599331ddc87fec8f028e63ce2f973