Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
Scan.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Scan.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
torpat/micropublishing.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
torpat/micropublishing.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
torpat/sueJl.cmd
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
torpat/sueJl.cmd
Resource
win10v2004-20221111-en
General
-
Target
Scan.lnk
-
Size
2KB
-
MD5
f3af4f62c6e8e9c2ea02ba43e284cace
-
SHA1
b415f25d6863e81ef48d2e5608f8957072a01776
-
SHA256
5a4d19234330276457f2a8a87af5d5df88d94d6d5a495d5bc7ebd81d677ea10f
-
SHA512
7355227536a684e8cb002dd3d8e36a72695a4197d23561acb0263d59bb3aa65e230830ff7d0b98c75b6fd032ef0d6cb1f3f8376a5dbee6fee7d01538ce45883c
Malware Config
Extracted
icedid
2271535685
babysoftletirs.com
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 6 4668 rundll32.exe 27 4668 rundll32.exe 46 4668 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 4668 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 rundll32.exe 4668 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3268 wrote to memory of 2576 3268 cmd.exe 81 PID 3268 wrote to memory of 2576 3268 cmd.exe 81 PID 2576 wrote to memory of 4556 2576 cmd.exe 82 PID 2576 wrote to memory of 4556 2576 cmd.exe 82 PID 2576 wrote to memory of 4668 2576 cmd.exe 83 PID 2576 wrote to memory of 4668 2576 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Scan.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c torpat\sueJl.cmd ljIV2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h torpat\micropublishing.dll C:\Users\Admin\AppData\Local\Temp\*3⤵PID:4556
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\micropublishing.dll,#13⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
Filesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39