Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    180s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 00:44

General

  • Target

    fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe

  • Size

    100KB

  • MD5

    147ce0ded445871a4a62657ddf0941e0

  • SHA1

    021ec9503d8180eb0faf192e7f88d0af9f6160ef

  • SHA256

    fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e

  • SHA512

    1e16bcc0d0920fa48b3a489f285026351659eb996b4dce2953c9051a99783098cb102fda6f9f7bdfbe667e410f7bc1e61533ffde11953bbad51a8d74f8fab802

  • SSDEEP

    3072:2RH2rkC8TSNFBucXFeBD+4jyhD88FidqaU0KO:Meu4MBTl8Fi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
    "C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Djj..bat" > nul 2> nul
      2⤵
        PID:3580

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Djj..bat

      Filesize

      274B

      MD5

      43af6a9ef4d8cfdb432b31aadb925fe4

      SHA1

      e815c9538cf85de6814c49edc6629b56a909d2a1

      SHA256

      844d26edd436d1e5baa12063eb02c4f93aff7a2712a0c493e042898aaef44c73

      SHA512

      0854ce97be41b70ffb08de4abcd065692163da83364db14563c035d59f97fc473b7a6bc5850bb0f9b4d6dc3a3c8501328bad34bdda04aa926203cdc090a03ca2

    • memory/4424-132-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4424-133-0x0000000000401000-0x0000000000408000-memory.dmp

      Filesize

      28KB

    • memory/4424-134-0x00000000018A0000-0x00000000018AA000-memory.dmp

      Filesize

      40KB

    • memory/4424-135-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4424-137-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB