Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 23:46

General

  • Target

    33585757bf506c4f9eba3434233bf8f336fcd2d3cef8feb1c74814cdf315c609.exe

  • Size

    136KB

  • MD5

    ad9583c06fae5b3cad9a013515aa49ee

  • SHA1

    1011b36333c7d2680dbdd6e5ee98ed41659d91bc

  • SHA256

    33585757bf506c4f9eba3434233bf8f336fcd2d3cef8feb1c74814cdf315c609

  • SHA512

    7dc95ec84415de8ede7e19c9aa10d2621bad0dfac97b4f8f069f2866010f6545485106db3721e04888149fe3f0b7ffa3c17563d5ccd35db440884bf205800fad

  • SSDEEP

    1536:RJXfqRm+BhRK1mH2GijPEUbaxnvdWkVqSP3PKh9pGw93mW9RcGwh+8hcXZDuS8Hx:70WEUbaxvN3wzUh2XZDutcHdVmn8+mo

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33585757bf506c4f9eba3434233bf8f336fcd2d3cef8feb1c74814cdf315c609.exe
    "C:\Users\Admin\AppData\Local\Temp\33585757bf506c4f9eba3434233bf8f336fcd2d3cef8feb1c74814cdf315c609.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Users\Admin\kuiaqu.exe
      "C:\Users\Admin\kuiaqu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kuiaqu.exe

    Filesize

    136KB

    MD5

    7ecd13b3210db450c3cbe733e8a0e6fd

    SHA1

    d9b15f96ea1620409b3aea989263a3c52fe75536

    SHA256

    2cc27897773d41ff5dc360ab25b6d2295fb26bd90ec1122981b8791711d60b49

    SHA512

    abd1e39c504148b6a82bb516ab6cf4334be25cfc61ef3e51f36bb0477fcd92b6fa0f17f710de76762d7acd24b2f628cd625d1fd1c8cb6ec92bcea94cac26a086

  • C:\Users\Admin\kuiaqu.exe

    Filesize

    136KB

    MD5

    7ecd13b3210db450c3cbe733e8a0e6fd

    SHA1

    d9b15f96ea1620409b3aea989263a3c52fe75536

    SHA256

    2cc27897773d41ff5dc360ab25b6d2295fb26bd90ec1122981b8791711d60b49

    SHA512

    abd1e39c504148b6a82bb516ab6cf4334be25cfc61ef3e51f36bb0477fcd92b6fa0f17f710de76762d7acd24b2f628cd625d1fd1c8cb6ec92bcea94cac26a086