Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe
Resource
win10v2004-20220812-en
General
-
Target
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe
-
Size
40KB
-
MD5
3977442beb038b57d50aaf11fcc5f589
-
SHA1
8274cf3ce45c8973d292927d7dc57e9e2aa11a5c
-
SHA256
bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0
-
SHA512
6422fbefb1a94ee7dcba25ec401df262d7fd7cb884bc9371b7e30447859df9c0b641caa938a96009864a6cd954336567ea8db0736f7a233c17d37f6d359e9818
-
SSDEEP
384:LlqPDZD1zHET9F8Esd8vmccAbpbNDgITHRN4EddWjRHbG3HQLqVIaO/pPHkRFNcx:L8ZD1DIGddEDbvHN4wkQ3wLMisC+JL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 Windows.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3152 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\55b3825ee39ada2fcddf7c7accbde69e.exe Windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\55b3825ee39ada2fcddf7c7accbde69e.exe Windows.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\55b3825ee39ada2fcddf7c7accbde69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\55b3825ee39ada2fcddf7c7accbde69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe 2272 Windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2272 Windows.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2272 4804 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe 79 PID 4804 wrote to memory of 2272 4804 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe 79 PID 4804 wrote to memory of 2272 4804 bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe 79 PID 2272 wrote to memory of 3152 2272 Windows.exe 80 PID 2272 wrote to memory of 3152 2272 Windows.exe 80 PID 2272 wrote to memory of 3152 2272 Windows.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe"C:\Users\Admin\AppData\Local\Temp\bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Windows.exe"C:\Users\Admin\AppData\Local\Temp\Windows.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Windows.exe" "Windows.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3152
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD53977442beb038b57d50aaf11fcc5f589
SHA18274cf3ce45c8973d292927d7dc57e9e2aa11a5c
SHA256bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0
SHA5126422fbefb1a94ee7dcba25ec401df262d7fd7cb884bc9371b7e30447859df9c0b641caa938a96009864a6cd954336567ea8db0736f7a233c17d37f6d359e9818
-
Filesize
40KB
MD53977442beb038b57d50aaf11fcc5f589
SHA18274cf3ce45c8973d292927d7dc57e9e2aa11a5c
SHA256bf73b303785f81f5a9b591ff73e915ba2434362c25cdb3d69ab7938751e2b7a0
SHA5126422fbefb1a94ee7dcba25ec401df262d7fd7cb884bc9371b7e30447859df9c0b641caa938a96009864a6cd954336567ea8db0736f7a233c17d37f6d359e9818