Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
Resource
win10v2004-20220812-en
General
-
Target
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
-
Size
100KB
-
MD5
147ce0ded445871a4a62657ddf0941e0
-
SHA1
021ec9503d8180eb0faf192e7f88d0af9f6160ef
-
SHA256
fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e
-
SHA512
1e16bcc0d0920fa48b3a489f285026351659eb996b4dce2953c9051a99783098cb102fda6f9f7bdfbe667e410f7bc1e61533ffde11953bbad51a8d74f8fab802
-
SSDEEP
3072:2RH2rkC8TSNFBucXFeBD+4jyhD88FidqaU0KO:Meu4MBTl8Fi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 3580 4424 fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe 82 PID 4424 wrote to memory of 3580 4424 fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe 82 PID 4424 wrote to memory of 3580 4424 fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe"C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Djj..bat" > nul 2> nul2⤵PID:3580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD543af6a9ef4d8cfdb432b31aadb925fe4
SHA1e815c9538cf85de6814c49edc6629b56a909d2a1
SHA256844d26edd436d1e5baa12063eb02c4f93aff7a2712a0c493e042898aaef44c73
SHA5120854ce97be41b70ffb08de4abcd065692163da83364db14563c035d59f97fc473b7a6bc5850bb0f9b4d6dc3a3c8501328bad34bdda04aa926203cdc090a03ca2