Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe
Resource
win10v2004-20220901-en
General
-
Target
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe
-
Size
78KB
-
MD5
945003bafa2e3c6d008df685e9820d36
-
SHA1
583f4e1455e6d64eb273f90e2ed3c92f355319c2
-
SHA256
39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96
-
SHA512
e9c47d4fbcb6076e0869d2965f6d594ba4c6db6069262bd7d8beb74fa929bd705ae58647219e69b1afe57e152ddab0ee1f40dff1e7f85a9003da12fcd0fa9247
-
SSDEEP
768:Q//QAtksRzwFys/n/L/n/Iy9y+fCn9wDVLrIzepPTeJttsud0MFtg4szKjugeanz:Q34I8/jfK+qOVnIYPyuMo4OaKYLFr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4920 dwm.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 528 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9c67cd1d587548c4935cdea93d6e94fd.exe dwm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9c67cd1d587548c4935cdea93d6e94fd.exe dwm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9c67cd1d587548c4935cdea93d6e94fd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dwm.exe\" .." dwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9c67cd1d587548c4935cdea93d6e94fd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dwm.exe\" .." dwm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe 4920 dwm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4920 dwm.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4920 4972 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe 81 PID 4972 wrote to memory of 4920 4972 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe 81 PID 4972 wrote to memory of 4920 4972 39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe 81 PID 4920 wrote to memory of 528 4920 dwm.exe 82 PID 4920 wrote to memory of 528 4920 dwm.exe 82 PID 4920 wrote to memory of 528 4920 dwm.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe"C:\Users\Admin\AppData\Local\Temp\39fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\dwm.exe"C:\Users\Admin\AppData\Local\Temp\dwm.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\dwm.exe" "dwm.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5945003bafa2e3c6d008df685e9820d36
SHA1583f4e1455e6d64eb273f90e2ed3c92f355319c2
SHA25639fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96
SHA512e9c47d4fbcb6076e0869d2965f6d594ba4c6db6069262bd7d8beb74fa929bd705ae58647219e69b1afe57e152ddab0ee1f40dff1e7f85a9003da12fcd0fa9247
-
Filesize
78KB
MD5945003bafa2e3c6d008df685e9820d36
SHA1583f4e1455e6d64eb273f90e2ed3c92f355319c2
SHA25639fe8eac5fd89bf85de2ebb2900ce19ddfea4e2c3ce31311ac7c15d813ef9c96
SHA512e9c47d4fbcb6076e0869d2965f6d594ba4c6db6069262bd7d8beb74fa929bd705ae58647219e69b1afe57e152ddab0ee1f40dff1e7f85a9003da12fcd0fa9247