Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    171s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 22:15

General

  • Target

    bd1069b89c06d1415f19fa199da0947999c83caa46c3a7cf7bf1c5d9d28a0b8b.exe

  • Size

    1.9MB

  • MD5

    fb08b6a3e9fa2449fd5766395ae3400e

  • SHA1

    2097abdd95de0a3f12f4a90efe24ff93bf4533ec

  • SHA256

    bd1069b89c06d1415f19fa199da0947999c83caa46c3a7cf7bf1c5d9d28a0b8b

  • SHA512

    6c1374c798f0cd06db47f5b7136693e38642123cddde14a8979f72205fcc100bb03836673df615b99cf31f27097d01f334957dcba7ffe8eb0e6eafef36cb0428

  • SSDEEP

    49152:mNABfJXAE3O6cCqErznDX7+0TyqxE7czXbys7r/:aABfKEe6iWznTi/6E7czOs7r

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1069b89c06d1415f19fa199da0947999c83caa46c3a7cf7bf1c5d9d28a0b8b.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1069b89c06d1415f19fa199da0947999c83caa46c3a7cf7bf1c5d9d28a0b8b.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\gYLrG4C.cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\gYLrG4C.cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\gYLrG4C.cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\gYLrG4C.cpl",
            5⤵
            • Loads dropped DLL
            PID:716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gYLrG4C.cpl

    Filesize

    2.1MB

    MD5

    9714316da1a89f9728c40c73d393ae22

    SHA1

    57a97f95ba1ebf2e31677c0ecdc856055d7edb02

    SHA256

    65ab6f469dcd72936a4997b90636ff2b192b8038f03b205e151631adff01f1c8

    SHA512

    15873df7483e0472b970a67eae92a2c8e446606e5c86b00511f2d56102fcaaa34d6de54f499334353c4a97bc53aae66539ae090d2a9fd46771be2ba9c21ea20c

  • C:\Users\Admin\AppData\Local\Temp\gYlrg4C.cpl

    Filesize

    2.1MB

    MD5

    9714316da1a89f9728c40c73d393ae22

    SHA1

    57a97f95ba1ebf2e31677c0ecdc856055d7edb02

    SHA256

    65ab6f469dcd72936a4997b90636ff2b192b8038f03b205e151631adff01f1c8

    SHA512

    15873df7483e0472b970a67eae92a2c8e446606e5c86b00511f2d56102fcaaa34d6de54f499334353c4a97bc53aae66539ae090d2a9fd46771be2ba9c21ea20c

  • C:\Users\Admin\AppData\Local\Temp\gYlrg4C.cpl

    Filesize

    2.1MB

    MD5

    9714316da1a89f9728c40c73d393ae22

    SHA1

    57a97f95ba1ebf2e31677c0ecdc856055d7edb02

    SHA256

    65ab6f469dcd72936a4997b90636ff2b192b8038f03b205e151631adff01f1c8

    SHA512

    15873df7483e0472b970a67eae92a2c8e446606e5c86b00511f2d56102fcaaa34d6de54f499334353c4a97bc53aae66539ae090d2a9fd46771be2ba9c21ea20c

  • memory/716-151-0x0000000003220000-0x000000000333A000-memory.dmp

    Filesize

    1.1MB

  • memory/716-148-0x0000000003410000-0x00000000034C4000-memory.dmp

    Filesize

    720KB

  • memory/716-147-0x0000000003340000-0x0000000003408000-memory.dmp

    Filesize

    800KB

  • memory/716-145-0x0000000002F80000-0x00000000030FE000-memory.dmp

    Filesize

    1.5MB

  • memory/716-146-0x0000000003220000-0x000000000333A000-memory.dmp

    Filesize

    1.1MB

  • memory/4948-139-0x0000000002790000-0x0000000002844000-memory.dmp

    Filesize

    720KB

  • memory/4948-138-0x0000000003210000-0x00000000032D8000-memory.dmp

    Filesize

    800KB

  • memory/4948-137-0x00000000030F0000-0x000000000320A000-memory.dmp

    Filesize

    1.1MB

  • memory/4948-136-0x0000000002E50000-0x0000000002FCE000-memory.dmp

    Filesize

    1.5MB

  • memory/4948-152-0x00000000030F0000-0x000000000320A000-memory.dmp

    Filesize

    1.1MB