Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe
Resource
win10v2004-20220812-en
General
-
Target
37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe
-
Size
420KB
-
MD5
e1286ea43b3659744170817636ad5b77
-
SHA1
dc7cc793a8064eaaa35d32caeb6151b4cc6657d7
-
SHA256
37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b
-
SHA512
dfb953712ab8ae8bdd69630cefb239224c8c45ab49af76faaaa83dcc601326e64d7d47cb6e2022c036ece88dcc0639faca3d56cb8198bc83ee0193dfe65fda9f
-
SSDEEP
6144:mGn41XHkt9zJaz/zwzMIgVUh3MmQwei+dOoEjJn8iXKRpbUFCXKU+33XQJJ3F:tn41Tz8FkUGmQrioOqia7EXo3
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1936 ~DF63C0.tmp 1448 37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe 2844 cupate.exe 112 mscaps.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ~DF63C0.tmp -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\mscaps.exe cupate.exe File opened for modification C:\Windows\SysWOW64\mscaps.exe cupate.exe File created C:\Windows\SysWOW64\cupate.exe ~DF63C0.tmp File opened for modification C:\Windows\SysWOW64\cupate.exe ~DF63C0.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1936 2564 37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe 78 PID 2564 wrote to memory of 1936 2564 37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe 78 PID 2564 wrote to memory of 1936 2564 37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe 78 PID 1936 wrote to memory of 1448 1936 ~DF63C0.tmp 79 PID 1936 wrote to memory of 1448 1936 ~DF63C0.tmp 79 PID 1936 wrote to memory of 1448 1936 ~DF63C0.tmp 79 PID 1936 wrote to memory of 2844 1936 ~DF63C0.tmp 80 PID 1936 wrote to memory of 2844 1936 ~DF63C0.tmp 80 PID 1936 wrote to memory of 2844 1936 ~DF63C0.tmp 80 PID 2844 wrote to memory of 112 2844 cupate.exe 82 PID 2844 wrote to memory of 112 2844 cupate.exe 82 PID 2844 wrote to memory of 112 2844 cupate.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe"C:\Users\Admin\AppData\Local\Temp\37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\~DF63C0.tmpC:\Users\Admin\AppData\Local\Temp\~DF63C0.tmp _$PID:308 _$EXE:C:\Users\Admin\AppData\Local\Temp\37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe _$CMDLINE:2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exeC:\Users\Admin\AppData\Local\Temp\37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe3⤵
- Executes dropped EXE
PID:1448
-
-
C:\Windows\SysWOW64\cupate.exe"C:\Windows\System32\cupate.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\mscaps.exe"C:\Windows\system32\mscaps.exe" /C:\Windows\SysWOW64\cupate.exe4⤵
- Executes dropped EXE
PID:112
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\37c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b.exe
Filesize68KB
MD58b4cbba1ea526830c7f97e7822e2493a
SHA1e519f493e42694c564aaa347745bab035bbcb3d9
SHA2561dfd05b1c0050db44f5b4293e5574bfc292af804a63fc0a70131bb498c326977
SHA512d1264f010d21aed0db2cc5749327866605ed701db42541cfe712ba2cedba78360cb2322b76d7101ddf18b7f9311c185d3c08589a4b66d00ea57977664299c6e6
-
Filesize
420KB
MD5e1286ea43b3659744170817636ad5b77
SHA1dc7cc793a8064eaaa35d32caeb6151b4cc6657d7
SHA25637c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b
SHA512dfb953712ab8ae8bdd69630cefb239224c8c45ab49af76faaaa83dcc601326e64d7d47cb6e2022c036ece88dcc0639faca3d56cb8198bc83ee0193dfe65fda9f
-
Filesize
420KB
MD5e1286ea43b3659744170817636ad5b77
SHA1dc7cc793a8064eaaa35d32caeb6151b4cc6657d7
SHA25637c5be1284b6b1e428de3978bc585c86bf381553aaba14b1d1a494da1f13277b
SHA512dfb953712ab8ae8bdd69630cefb239224c8c45ab49af76faaaa83dcc601326e64d7d47cb6e2022c036ece88dcc0639faca3d56cb8198bc83ee0193dfe65fda9f
-
Filesize
276KB
MD574cb6d7528cb43b6ae6886481439b8c8
SHA19f198d43be925e2e6536d5376ab27fcadb224859
SHA256fa89f4c4d2730b4f083df903977ac5da9869d3db15e25ec65a28feb236a6ace4
SHA512f8f716f97cb1a552af1eeeca81fe8aa150fc2cc1a98adca401be53d3fdad58bfa8bc618c52079e60d96db391a82e3d27ffb3f4b10db1c722802d6d2a7c1ea8e5
-
Filesize
276KB
MD574cb6d7528cb43b6ae6886481439b8c8
SHA19f198d43be925e2e6536d5376ab27fcadb224859
SHA256fa89f4c4d2730b4f083df903977ac5da9869d3db15e25ec65a28feb236a6ace4
SHA512f8f716f97cb1a552af1eeeca81fe8aa150fc2cc1a98adca401be53d3fdad58bfa8bc618c52079e60d96db391a82e3d27ffb3f4b10db1c722802d6d2a7c1ea8e5
-
Filesize
200KB
MD57465eb9764842e2281d443d12809b07b
SHA16b6e12fd43fcfdd9253190c44a1ac315644c3dbb
SHA256061f1383cef06b07a77fe2c136e6a3e18f5eeaa9030b452e6312e3763a5e7f6b
SHA5122d69e83328abcc76915cfbbb7b6e9202697be2d6f385b4aa80551286c190eaee1e3c8ffe61b013448ca582abd78c262cbc2b3b4d565901699486aaa4fd346980
-
Filesize
200KB
MD57465eb9764842e2281d443d12809b07b
SHA16b6e12fd43fcfdd9253190c44a1ac315644c3dbb
SHA256061f1383cef06b07a77fe2c136e6a3e18f5eeaa9030b452e6312e3763a5e7f6b
SHA5122d69e83328abcc76915cfbbb7b6e9202697be2d6f385b4aa80551286c190eaee1e3c8ffe61b013448ca582abd78c262cbc2b3b4d565901699486aaa4fd346980