Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe
Resource
win10v2004-20220901-en
General
-
Target
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe
-
Size
669KB
-
MD5
f77a78db60b09f6dd1c5e46981a40683
-
SHA1
b57eec71cecce31b28ab90d29f952b0b3b97c490
-
SHA256
90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347
-
SHA512
6766165d47c57270780fca76ba2e4d726977e4aacf727bba23be815fccb37bfa78df4ca7d3baa99ad76815a439916ec078fa1639a55a1ee26bbd1353fe09d6e0
-
SSDEEP
12288:wnmaWd0zLoWcebTpPlYcFyfXvHF3Z4mxxeDqVTVOCny:wmaWuw6TZ6ccXfQmXtVTzny
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4844 2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Fiele Ps.txt 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3868 wrote to memory of 4844 3868 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 81 PID 3868 wrote to memory of 4844 3868 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 81 PID 3868 wrote to memory of 4844 3868 90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe 81 PID 4844 wrote to memory of 952 4844 2.exe 82 PID 4844 wrote to memory of 952 4844 2.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe"C:\Users\Admin\AppData\Local\Temp\90fd62af20246d9876e0ce0e9a8aad0349fe22a816e24ea830c3ec5a7b0f7347.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD509e4173c823325da3a9dea8927b38d3d
SHA160b2a238461b35c394ea8423a7cfd990e8ad0c9a
SHA2565303856f73b771c06cb967455e7f13d8a22472dbb56bfe8ecd4807e9f5d9f29d
SHA5128a001aeeb5d4c98e341b9c87c1159e6fade4003053c1852d957e9f3bba90347a76d88841fd21fd7cbb605518a703293278bb73994593c9e9ea6b8e8dfdda1175
-
Filesize
355KB
MD509e4173c823325da3a9dea8927b38d3d
SHA160b2a238461b35c394ea8423a7cfd990e8ad0c9a
SHA2565303856f73b771c06cb967455e7f13d8a22472dbb56bfe8ecd4807e9f5d9f29d
SHA5128a001aeeb5d4c98e341b9c87c1159e6fade4003053c1852d957e9f3bba90347a76d88841fd21fd7cbb605518a703293278bb73994593c9e9ea6b8e8dfdda1175