Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 02:10
Static task
static1
General
-
Target
87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53.exe
-
Size
250KB
-
MD5
53cce95f5bfb66c6f9a7394a1269afa2
-
SHA1
25534338447d6dd1fd2a660278e570613ef838e4
-
SHA256
87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53
-
SHA512
661a2eead2b394302fccafa0c7df71711b9013bef7454313603e95c0093b218dd0fe341b5fc3216ea7c3253f00ccd87247eaf186d91a4fff9032209836af2ef5
-
SSDEEP
6144:Dg3O5R5hgK9vZPf9ZaSKNxphi39NOvpgY:s3O5RsK9Zf9ZafzpK8
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 4748 gntuud.exe 3424 gntuud.exe 4828 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4952 4884 WerFault.exe 81 4556 3424 WerFault.exe 89 1512 4828 WerFault.exe 96 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4316 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4748 4884 87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53.exe 82 PID 4884 wrote to memory of 4748 4884 87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53.exe 82 PID 4884 wrote to memory of 4748 4884 87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53.exe 82 PID 4748 wrote to memory of 4316 4748 gntuud.exe 86 PID 4748 wrote to memory of 4316 4748 gntuud.exe 86 PID 4748 wrote to memory of 4316 4748 gntuud.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53.exe"C:\Users\Admin\AppData\Local\Temp\87f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:4316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 9042⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4884 -ip 48841⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 4242⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3424 -ip 34241⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 4202⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4828 -ip 48281⤵PID:1256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD553cce95f5bfb66c6f9a7394a1269afa2
SHA125534338447d6dd1fd2a660278e570613ef838e4
SHA25687f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53
SHA512661a2eead2b394302fccafa0c7df71711b9013bef7454313603e95c0093b218dd0fe341b5fc3216ea7c3253f00ccd87247eaf186d91a4fff9032209836af2ef5
-
Filesize
250KB
MD553cce95f5bfb66c6f9a7394a1269afa2
SHA125534338447d6dd1fd2a660278e570613ef838e4
SHA25687f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53
SHA512661a2eead2b394302fccafa0c7df71711b9013bef7454313603e95c0093b218dd0fe341b5fc3216ea7c3253f00ccd87247eaf186d91a4fff9032209836af2ef5
-
Filesize
250KB
MD553cce95f5bfb66c6f9a7394a1269afa2
SHA125534338447d6dd1fd2a660278e570613ef838e4
SHA25687f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53
SHA512661a2eead2b394302fccafa0c7df71711b9013bef7454313603e95c0093b218dd0fe341b5fc3216ea7c3253f00ccd87247eaf186d91a4fff9032209836af2ef5
-
Filesize
250KB
MD553cce95f5bfb66c6f9a7394a1269afa2
SHA125534338447d6dd1fd2a660278e570613ef838e4
SHA25687f4d0475836f47cdd74afd2cfe0f97f4f2f0b86f4d84f4fe4a6daa6cffc0c53
SHA512661a2eead2b394302fccafa0c7df71711b9013bef7454313603e95c0093b218dd0fe341b5fc3216ea7c3253f00ccd87247eaf186d91a4fff9032209836af2ef5