Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    202s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 12:47

General

  • Target

    b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e.exe

  • Size

    840KB

  • MD5

    6b3ce93d85920fbb6945ae50444e9814

  • SHA1

    4136c8bd98230f322a66b716657b5416e5b54709

  • SHA256

    b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e

  • SHA512

    99d1a5634dcce95b58804dc03cef2e6ad282db415ceeb2e47bb26ddaafe5d4a26800271ddefd471b1508271b3f5fd9ca5a6fb4b3880135456b4200b7d7fe68d7

  • SSDEEP

    24576:6Woih7R4t1VyWkuS6/D7TnF7Ex7UM4Fs:6IAkW77p

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 9 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e.exe
    "C:\Users\Admin\AppData\Local\Temp\b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Users\Admin\AppData\Local\Temp\b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e.exe 
      C:\Users\Admin\AppData\Local\Temp\b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e.exe 
      2⤵
      • Executes dropped EXE
      PID:4924
    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\wscp.exe
      "c:\Documents and Settings\Admin\Application Data\Microsoft\wscp.exe" b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e
      2⤵
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e.exe 

    Filesize

    768KB

    MD5

    2a7a3a8f016fba41d92070eee333f97e

    SHA1

    7545e28936ac8a169f384084c8fda7200f565a6d

    SHA256

    6429ea6f4f3beb2bf732b30b6688d9767a3dbfe82ece08f3b36feb229f6c0ac0

    SHA512

    5441065eefbec6f787781eb6873c47ba9c62b40c4ff5e9dfdaf86395d444934b9a0330d81401667ae1968c8d2778684a4bd159a3df33d015f91719ccfa562be3

  • C:\Users\Admin\AppData\Local\Temp\b50330e478d8f64d2bcfe0dcc5594f9e18d993308c44fed9d94b04eb8e40e60e.exe 

    Filesize

    768KB

    MD5

    2a7a3a8f016fba41d92070eee333f97e

    SHA1

    7545e28936ac8a169f384084c8fda7200f565a6d

    SHA256

    6429ea6f4f3beb2bf732b30b6688d9767a3dbfe82ece08f3b36feb229f6c0ac0

    SHA512

    5441065eefbec6f787781eb6873c47ba9c62b40c4ff5e9dfdaf86395d444934b9a0330d81401667ae1968c8d2778684a4bd159a3df33d015f91719ccfa562be3

  • C:\Users\Admin\AppData\Roaming\Microsoft\wscp.exe

    Filesize

    76KB

    MD5

    2ebb2a4399cbfd6ffec53e813f92f9b8

    SHA1

    f69b7fb9ce0b3092b5bd9e7dd33f4a91e4147598

    SHA256

    a1c88eed3e59f1a35371424cb3dfeadca168c0496ba0ff496d2c29062a18602b

    SHA512

    43e3d2ad40354838797a2cdc05c826d82d62bf6a8498604062a94b788bc8411c9887f23088e022ae3f4e7b8f72c373aa73b60fac66df270e950ba3c8e84302be

  • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\NIMDA ANGEL.bmp

    Filesize

    448KB

    MD5

    e7887e0244bca82d067ca54d68a5836d

    SHA1

    ab5e75e99d054fa9eeb7a654ab1b4950313edd59

    SHA256

    84ce3dc90d1826b6739a2119460f031d9751d0e36e8569e6bc1cc9428b761437

    SHA512

    132790a81dd638e951674c53275147745a4584414dc4b61d58b471cb73922bac3c812d749556a446838e75e3044c67909dc616aceca0b4987250a51a9b606d0d

  • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\wscp.exe

    Filesize

    76KB

    MD5

    2ebb2a4399cbfd6ffec53e813f92f9b8

    SHA1

    f69b7fb9ce0b3092b5bd9e7dd33f4a91e4147598

    SHA256

    a1c88eed3e59f1a35371424cb3dfeadca168c0496ba0ff496d2c29062a18602b

    SHA512

    43e3d2ad40354838797a2cdc05c826d82d62bf6a8498604062a94b788bc8411c9887f23088e022ae3f4e7b8f72c373aa73b60fac66df270e950ba3c8e84302be

  • \??\c:\windows\Desktop.ini

    Filesize

    127B

    MD5

    8052b40f98237069a82665e8e410104a

    SHA1

    3036d150d270117154f87834fa3bb06410b6ee47

    SHA256

    107ea9afadb0dd5adc3ac7e41520d4d65530da78cf86c70bf225572c0d1a4329

    SHA512

    a6e77194678ffb3b8844628e98562f644a58ba04661477a7cdc6cfabd0fba8d71fbff60f621a1b3bc7949a983b0a29df689c4a5b6b838e757b047a020dc56631

  • \??\c:\windows\SysWOW64\XPs.ini

    Filesize

    256KB

    MD5

    42b947eae0d63c06564b0f6c47d34fc5

    SHA1

    a995481e06dd5e0aab39c5c9eb969728802c9f5c

    SHA256

    c76b0187013c31feb7fdd810c4f2d01c347cfbc1dbe71e1711ca3c245d4a0fd3

    SHA512

    14abd8f93e25763aaafd273a59c9eac384015c0761dcb488622362b1e05d46bec95782f1af7f8011e50227bcaed8320ef4e4cacddf4a03ba257f73d14eeffb87

  • \??\c:\windows\SysWOW64\maxtrox.txt

    Filesize

    8B

    MD5

    24865ca220aa1936cbac0a57685217c5

    SHA1

    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

    SHA256

    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

    SHA512

    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062