Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    190s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 00:04

General

  • Target

    6782cbcaaf33f2778eaae119924107c2a208652a065530d3d9ad73182bf7abf8.exe

  • Size

    152KB

  • MD5

    7e12640bc065bd9bc82d11bf7d6522ff

  • SHA1

    08c1721fb0d2b8851e89e25f0ea39b2237ef1e26

  • SHA256

    6782cbcaaf33f2778eaae119924107c2a208652a065530d3d9ad73182bf7abf8

  • SHA512

    9facb67a1fa3af772055dc13de09898cd4a738ea46441a0c2c8282ad93ed8e2091301298fb9d0902eb84d0633bdc247aa0556031050c5f34704963bd3051dc00

  • SSDEEP

    3072:BhUFgQTQtKrueiygR4O6avJamofZ4oQZiEcJTh:2gEQtKSMgR56avUm2WSj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6782cbcaaf33f2778eaae119924107c2a208652a065530d3d9ad73182bf7abf8.exe
    "C:\Users\Admin\AppData\Local\Temp\6782cbcaaf33f2778eaae119924107c2a208652a065530d3d9ad73182bf7abf8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Users\Admin\gouhep.exe
      "C:\Users\Admin\gouhep.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gouhep.exe

    Filesize

    152KB

    MD5

    85ae8aad5755382388fdf4bf8e78a08b

    SHA1

    a09a8c0809d52ddb8e84e9341e40f5efd39cf57d

    SHA256

    88ef5153997f27e66ab497e0abc0554d0a68e701ef3c30ceb3639884dc793af5

    SHA512

    f1f6a95542c430dfd13a96df9dad95c2ed816bc937ce6d99e44f6d4bd940aef8dc063790d206d75f3965b1537144a80dd2390b7d97acdef2618a23d8142ac7de

  • C:\Users\Admin\gouhep.exe

    Filesize

    152KB

    MD5

    85ae8aad5755382388fdf4bf8e78a08b

    SHA1

    a09a8c0809d52ddb8e84e9341e40f5efd39cf57d

    SHA256

    88ef5153997f27e66ab497e0abc0554d0a68e701ef3c30ceb3639884dc793af5

    SHA512

    f1f6a95542c430dfd13a96df9dad95c2ed816bc937ce6d99e44f6d4bd940aef8dc063790d206d75f3965b1537144a80dd2390b7d97acdef2618a23d8142ac7de