Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe
Resource
win10v2004-20221111-en
General
-
Target
80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe
-
Size
173KB
-
MD5
ebb1ba2ee98688a8fb136e6922d36149
-
SHA1
787f0c098f82793cd5c236da41de1453bb965b5a
-
SHA256
80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7
-
SHA512
3a3caa902507a80bf136987d5c586a4d68e8f03e2a1b935a01dfa5b7ff01524aeea6deddb2cbf2b69f7b358f02277ac85cc0b9165a90a4c9c493044a7fe7cc26
-
SSDEEP
3072:X4lRkAehGfzmuqTPryFsYax1o9Yh+ZHAzfPZ7Xy4bHlAIyHUQ:X4lRkAehaKuqT+FsYa5+OPNi4Z8
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 320 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ = "vbGH43.exe" reg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\vbGH43.exe cmd.exe File opened for modification C:\Windows\vbGH43.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4660 reg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2640 wrote to memory of 5072 2640 80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe 84 PID 2640 wrote to memory of 5072 2640 80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe 84 PID 2640 wrote to memory of 5072 2640 80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe 84 PID 5072 wrote to memory of 2764 5072 cmd.exe 86 PID 5072 wrote to memory of 2764 5072 cmd.exe 86 PID 5072 wrote to memory of 2764 5072 cmd.exe 86 PID 5072 wrote to memory of 320 5072 cmd.exe 87 PID 5072 wrote to memory of 320 5072 cmd.exe 87 PID 5072 wrote to memory of 320 5072 cmd.exe 87 PID 5072 wrote to memory of 4660 5072 cmd.exe 88 PID 5072 wrote to memory of 4660 5072 cmd.exe 88 PID 5072 wrote to memory of 4660 5072 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 320 attrib.exe 2764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe"C:\Users\Admin\AppData\Local\Temp\80d92ce6870c14705cad6772fd213fb2db3a7ae2e22a9cc57c3e33607603d4f7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\78hjHG.cmd" "2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\attrib.exeattrib -A -H -S -R hosts3⤵
- Views/modifies file attributes
PID:2764
-
-
C:\Windows\SysWOW64\attrib.exeattrib +S +H +R hosts3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:320
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /ve /d "vbGH43.exe" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424B
MD55ee2b3c2ec0e379e12c4d8242a5fb350
SHA1be8f7a06dee09e906aa64595873b579ca89955fa
SHA256e3391d741ba7f8ba9208003bec615ed52e02cdfc33c9ee4635011b4cef007d0b
SHA51212ed52d19abedc93ec057251b4a9a21f7bfde532d68dd5f1ffdec46ed96bf757304ab310e6fd948351348dd0c6ec89a621a6aeb02aed9020ef49670496f54192
-
Filesize
100KB
MD584def025e483423d3b8431a3e1eb6a95
SHA128dd6e10c85958334a18b02f835fe8358941afd6
SHA2567f8cecb48badfd674bcae781161a87e69e52407eac3e2bae9c6555d16dce4773
SHA512e1477f7f22fefddf92c287632e0f7b7f22a4fa2506f13f13064dc97b2c3bd0ebaf1b1440a200b76f1ad93ec98a3c652c2fc2a6af9ae2e5b3bfe6aa41f087a969