Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
312s -
max time network
320s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe
Resource
win10v2004-20221111-en
General
-
Target
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe
-
Size
185KB
-
MD5
0e22dc4ec23c2ad3e944ebe6b52a49f5
-
SHA1
ce8466ca405cc6951e0a5fd7f5623763fb890d87
-
SHA256
7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6
-
SHA512
b1d87a5448b76caddb89ff116516fc2ea06341b9998152b7cfad547e941588dae72db69f538b42874ec3340d66270d33d3c7519cdf21088b37bd12898b978845
-
SSDEEP
3072:Yoaqm6uw0n+amEoK4OG01qhzJ5yMGh6DGj4t5u7LAzGtEfo6ta6dDKKEp7xz1S+d:YRqmpp+amNOGokzLyM9tsLAitQo6tzON
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\lncom.exe 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe File created C:\Windows\SysWOW64\lncom_.jpg 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4840 3168 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe 80 PID 3168 wrote to memory of 4840 3168 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe 80 PID 3168 wrote to memory of 4840 3168 7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe"C:\Users\Admin\AppData\Local\Temp\7294eeaaff759010bf168e9ed6dee1ef782b295903cbc1c8d5683532de67bca6.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\7294EE~1.EXE.bat2⤵PID:4840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD52a6cc6651b4f211285c3a5912d3620be
SHA1c5805ef09471f36cded5c50fd3016398e3f9b374
SHA256808f81d656c36d987597fb5beb020bfdbf746421b3acc9d9836fd04981dba6e5
SHA51256cf58226f58599c52c1ed459bd82935d92ff1d667c0d418afb582a6c285e450af4dcdd6d63f982ae82d389e15b6d95bd258dc4ad04f7cc3530dfc1aea0c2940