Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    214s
  • max time network
    237s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 00:22

General

  • Target

    a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c.exe

  • Size

    240KB

  • MD5

    3a64fb8501c0a0f95674f693d12732b3

  • SHA1

    43aa89702e249652309cabd2a2b0486241af5d4b

  • SHA256

    a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c

  • SHA512

    b74ddba9c3ad9faeec8b6c117f198a6da37e077409077b6cb64309ff765534564a498b42ef2d957a6f956bdde20a80fc5f0b3433ab5a9c4075bf3307b4f95e0e

  • SSDEEP

    3072:+kNuT8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5cztt:+F0UGKGkFRKfeoztO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c.exe
    "C:\Users\Admin\AppData\Local\Temp\a3b8da3b0aa1b3c826814dd34675d4711ebdaea548c6f0ab82f3f4fbf0118a7c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\taose.exe
      "C:\Users\Admin\taose.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\taose.exe

    Filesize

    240KB

    MD5

    78f032a51668d314b125bf8b3247642b

    SHA1

    88604a9247236c0015bcd8f2472ee62a505d2d87

    SHA256

    cc107db165322c7f670e239ab15ef4a3759bb9cd4ea74265c906fd88bcc8a7c1

    SHA512

    6ac3d1b5390f8f3d4826f0e91b0b597024b847f1976d5b1a1853de75c8ef26417dc1e7790d5b26349d3da25f039856086ed903b50d86d1f2e9f3b0ec0245262f

  • C:\Users\Admin\taose.exe

    Filesize

    240KB

    MD5

    78f032a51668d314b125bf8b3247642b

    SHA1

    88604a9247236c0015bcd8f2472ee62a505d2d87

    SHA256

    cc107db165322c7f670e239ab15ef4a3759bb9cd4ea74265c906fd88bcc8a7c1

    SHA512

    6ac3d1b5390f8f3d4826f0e91b0b597024b847f1976d5b1a1853de75c8ef26417dc1e7790d5b26349d3da25f039856086ed903b50d86d1f2e9f3b0ec0245262f