Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe
Resource
win10v2004-20220901-en
General
-
Target
af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe
-
Size
1.2MB
-
MD5
451644aa5b271c3ddab56547d83b5144
-
SHA1
ce65d3d09e32ce7928c117fa9f652708de2cb5c0
-
SHA256
af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac
-
SHA512
c01e0d3e00e67c786dbd56dbf6d2e3070a4f29e49d6fb7194961f50fae064a1a416e291a28a496ba9d4cd78521d36f66c319979b04907a1b49a02e2afa7b8229
-
SSDEEP
24576:pbeXU9l7Sz/Q9Th2G2ojLgFfPvV8jU/x:R34z6ThhbU/x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3976 10238115.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\10238115 = "C:\\ProgramData\\10238115\\10238115.exe" af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 10238115.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\10238115 = "C:\\PROGRA~3\\10238115\\10238115.exe" 10238115.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3780 3248 WerFault.exe 81 3512 3976 WerFault.exe 88 -
Kills process with taskkill 1 IoCs
pid Process 3684 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3976 10238115.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3684 taskkill.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe 3976 10238115.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4836 3248 af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe 84 PID 3248 wrote to memory of 4836 3248 af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe 84 PID 3248 wrote to memory of 4836 3248 af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe 84 PID 4836 wrote to memory of 3684 4836 cmd.exe 86 PID 4836 wrote to memory of 3684 4836 cmd.exe 86 PID 4836 wrote to memory of 3684 4836 cmd.exe 86 PID 4836 wrote to memory of 176 4836 cmd.exe 87 PID 4836 wrote to memory of 176 4836 cmd.exe 87 PID 4836 wrote to memory of 176 4836 cmd.exe 87 PID 176 wrote to memory of 3976 176 cmd.exe 88 PID 176 wrote to memory of 3976 176 cmd.exe 88 PID 176 wrote to memory of 3976 176 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe"C:\Users\Admin\AppData\Local\Temp\af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 4882⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\10238115\10238115.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\10238115\10238115.exe /install3⤵
- Suspicious use of WriteProcessMemory
PID:176 -
C:\PROGRA~3\10238115\10238115.exeC:\PROGRA~3\10238115\10238115.exe /install4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 5005⤵
- Program crash
PID:3512
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3248 -ip 32481⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3976 -ip 39761⤵PID:3108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5451644aa5b271c3ddab56547d83b5144
SHA1ce65d3d09e32ce7928c117fa9f652708de2cb5c0
SHA256af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac
SHA512c01e0d3e00e67c786dbd56dbf6d2e3070a4f29e49d6fb7194961f50fae064a1a416e291a28a496ba9d4cd78521d36f66c319979b04907a1b49a02e2afa7b8229
-
Filesize
322B
MD520b93bc37707d3e7d9d1a0264a3b118d
SHA150ce264465c5e8905a57054e03a23e296f3c3a77
SHA2564ee02ff669cd765f6c0bf6adcf11ee93a4903b5b0cec37266345ce465327a7e5
SHA512b82069edbd1e9a29120726a49f14c86eb691a441c241d914427a991cee5cfca3879f1b664eb30f76bf68b1ac2bb0ffd54e15f7eb5d66a618465363aa19aaa9a3
-
Filesize
1.2MB
MD5451644aa5b271c3ddab56547d83b5144
SHA1ce65d3d09e32ce7928c117fa9f652708de2cb5c0
SHA256af73ef4dae4990e1f509a1b394a6f0cd0250ef1a30071e263e746f6d255046ac
SHA512c01e0d3e00e67c786dbd56dbf6d2e3070a4f29e49d6fb7194961f50fae064a1a416e291a28a496ba9d4cd78521d36f66c319979b04907a1b49a02e2afa7b8229