Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 23:04

General

  • Target

    865ad7cdfc9f6d685f89235bd94dee185bbfda19af79917dfd6096d8745d52aa.exe

  • Size

    706KB

  • MD5

    62fb3e66c7ff27f0c0c835ce47fb3434

  • SHA1

    3376849ed9fff0255aff757e5ceb49190e50793e

  • SHA256

    865ad7cdfc9f6d685f89235bd94dee185bbfda19af79917dfd6096d8745d52aa

  • SHA512

    9cafb43aa1a5dcf33b92e64d63009579f71c602155fa32ba338f722f3e6155e90f8566df46b1bc19e0992b35edfd4b51c10ad44d3fe9a45d221fe300ff1de2c4

  • SSDEEP

    12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGspxjg0rDHnam:gpQ/6trYlvYPK+lqD73TeGspxjzam

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\865ad7cdfc9f6d685f89235bd94dee185bbfda19af79917dfd6096d8745d52aa.exe
    "C:\Users\Admin\AppData\Local\Temp\865ad7cdfc9f6d685f89235bd94dee185bbfda19af79917dfd6096d8745d52aa.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Windows\ScrBlaze.scr
      "C:\Windows\ScrBlaze.scr" /S
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2732
  • C:\Windows\ScrBlaze.scr
    C:\Windows\ScrBlaze.scr /s
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:3660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\17NKjm[1].htm

    Filesize

    125B

    MD5

    1cd6fcc634a5715f528fa28fd1a87c54

    SHA1

    6a6d7dac28bb8a89e87ed677966f95df583ee210

    SHA256

    d233c49335982d56db02bebfdb395b50c19fc0bf8fcb61409afe0777c08a501d

    SHA512

    1ff16b809e07511efcadb7fa1af2b26ad092c42a65aa1ff3e4ee8e07bbdee836eab660b9ae3ed3ce1016dd08699826064759a3077696eb604d42b64d1b320c32

  • C:\Windows\ScrBlaze.scr

    Filesize

    706KB

    MD5

    62fb3e66c7ff27f0c0c835ce47fb3434

    SHA1

    3376849ed9fff0255aff757e5ceb49190e50793e

    SHA256

    865ad7cdfc9f6d685f89235bd94dee185bbfda19af79917dfd6096d8745d52aa

    SHA512

    9cafb43aa1a5dcf33b92e64d63009579f71c602155fa32ba338f722f3e6155e90f8566df46b1bc19e0992b35edfd4b51c10ad44d3fe9a45d221fe300ff1de2c4

  • C:\Windows\ScrBlaze.scr

    Filesize

    706KB

    MD5

    62fb3e66c7ff27f0c0c835ce47fb3434

    SHA1

    3376849ed9fff0255aff757e5ceb49190e50793e

    SHA256

    865ad7cdfc9f6d685f89235bd94dee185bbfda19af79917dfd6096d8745d52aa

    SHA512

    9cafb43aa1a5dcf33b92e64d63009579f71c602155fa32ba338f722f3e6155e90f8566df46b1bc19e0992b35edfd4b51c10ad44d3fe9a45d221fe300ff1de2c4

  • C:\Windows\ScrBlaze.scr

    Filesize

    706KB

    MD5

    62fb3e66c7ff27f0c0c835ce47fb3434

    SHA1

    3376849ed9fff0255aff757e5ceb49190e50793e

    SHA256

    865ad7cdfc9f6d685f89235bd94dee185bbfda19af79917dfd6096d8745d52aa

    SHA512

    9cafb43aa1a5dcf33b92e64d63009579f71c602155fa32ba338f722f3e6155e90f8566df46b1bc19e0992b35edfd4b51c10ad44d3fe9a45d221fe300ff1de2c4

  • C:\Windows\s18273659

    Filesize

    907B

    MD5

    fbdeeeebb5d58ced7e02010a5cbdc6e3

    SHA1

    fbfa9374130a1ab8c373b55471eced97e19dc69c

    SHA256

    9532bd7d9c9909f5dacce010e18c6a0a661480d131e0e9ef10f415f7baa8bbca

    SHA512

    39ff856c9c057aeb99dd6e62502e605b85497d0be6b9158fcb2c2ecf50fd769b49dbce0f94ebb3781c6830a95a90ea536bdcdb53cedb48782068e1f264e5f787

  • C:\Windows\s18273659

    Filesize

    907B

    MD5

    fbdeeeebb5d58ced7e02010a5cbdc6e3

    SHA1

    fbfa9374130a1ab8c373b55471eced97e19dc69c

    SHA256

    9532bd7d9c9909f5dacce010e18c6a0a661480d131e0e9ef10f415f7baa8bbca

    SHA512

    39ff856c9c057aeb99dd6e62502e605b85497d0be6b9158fcb2c2ecf50fd769b49dbce0f94ebb3781c6830a95a90ea536bdcdb53cedb48782068e1f264e5f787

  • C:\Windows\s18273659

    Filesize

    929B

    MD5

    64d348e6112231c3970f933b0b8a7b4a

    SHA1

    0cd11b59c8a104503c709ca73295ee9016e120ca

    SHA256

    ee47f516f7b8bcbeff4f6257bd04c1610162c79f630a4619102548e7e96be926

    SHA512

    b1b9d2be7225fd585131c980e65344dd2c343e58291eff4eca1521af8469cbc3b9768d3baff6a32a3eea760547feb35e995a1f2c64e9ab40b48bbd91da0d3ecd