Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    189s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 03:53 UTC

General

  • Target

    d9f97c2513e9dbc5a065cc4107576e8a9fd22febbd4a5c3857cf388e21cd9b07.exe

  • Size

    492KB

  • MD5

    6c5a68c3aba0ddcedd8c5b2cd13b65d0

  • SHA1

    6dd1839a937b966096ffc7202810bd02d49aec55

  • SHA256

    d9f97c2513e9dbc5a065cc4107576e8a9fd22febbd4a5c3857cf388e21cd9b07

  • SHA512

    8c10f16cb360a9a0383b5b5928451e9a04d2aa3d874263e8f1fc2cb2c469e14cf96da2aa4bd31de732162425b162c05e1c348bec59ea01e8fe94fb455c9cce73

  • SSDEEP

    12288:NWuYKH78FYmqyg31CVUK2IKhujlY8y0aeqsNYQU6VBaa8AYcwHVVFV:vQqs2qFyBai

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9f97c2513e9dbc5a065cc4107576e8a9fd22febbd4a5c3857cf388e21cd9b07.exe
    "C:\Users\Admin\AppData\Local\Temp\d9f97c2513e9dbc5a065cc4107576e8a9fd22febbd4a5c3857cf388e21cd9b07.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe
      "C:\Users\Admin\AppData\Local\Temp\%tmp%.exe"
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:4060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\%tmp%.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\%tmp%.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2692
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4004
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2312
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\servercik.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\servercik.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:400
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\servercik.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\servercik.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1788

Network

  • flag-unknown
    DNS
    delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    1delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    1delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    14.110.152.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.110.152.52.in-addr.arpa
    IN PTR
    Response
  • flag-unknown
    DNS
    2delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    2delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • flag-unknown
    DNS
    3delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    3delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    4delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    4delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    5delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    5delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    6delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    6delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    7delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    7delikralll.dyndns.org
    IN A
    Response
  • flag-unknown
    DNS
    8delikralll.dyndns.org
    %tmp%.exe
    Remote address:
    8.8.8.8:53
    Request
    8delikralll.dyndns.org
    IN A
    Response
  • 8.238.21.126:80
    260 B
    5
  • 209.197.3.8:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 40.79.189.58:443
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 8.238.21.126:80
    322 B
    7
  • 67.24.35.254:80
    46 B
    40 B
    1
    1
  • 8.8.8.8:53
    delikralll.dyndns.org
    dns
    %tmp%.exe
    67 B
    118 B
    1
    1

    DNS Request

    delikralll.dyndns.org

  • 8.8.8.8:53
    delikralll.dyndns.org
    dns
    %tmp%.exe
    67 B
    118 B
    1
    1

    DNS Request

    delikralll.dyndns.org

  • 8.8.8.8:53
    1delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    1delikralll.dyndns.org

  • 8.8.8.8:53
    14.110.152.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    14.110.152.52.in-addr.arpa

  • 8.8.8.8:53
    2delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    2delikralll.dyndns.org

  • 8.8.8.8:53
    0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa

  • 8.8.8.8:53
    3delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    3delikralll.dyndns.org

  • 8.8.8.8:53
    4delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    4delikralll.dyndns.org

  • 8.8.8.8:53
    5delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    5delikralll.dyndns.org

  • 8.8.8.8:53
    6delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    6delikralll.dyndns.org

  • 8.8.8.8:53
    7delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    7delikralll.dyndns.org

  • 8.8.8.8:53
    8delikralll.dyndns.org
    dns
    %tmp%.exe
    68 B
    119 B
    1
    1

    DNS Request

    8delikralll.dyndns.org

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe

    Filesize

    175KB

    MD5

    d2b4adb2ea666230b62b91ab2ff015ce

    SHA1

    8815248fbd6a70505346e9ffd2fe8a6a63435995

    SHA256

    ca3f4d3e23acf9fa7689768c28a41286789994b44e79d8e80d295ca21728b7bc

    SHA512

    6789542a892c3ab1c6d322c1a6f0913206aa81c5966776c3d785ef7a3150a2e4ac4b4f44258704a2052dffe4000c97f26f973509bde8308369ca4cd3c85c1677

  • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe

    Filesize

    175KB

    MD5

    d2b4adb2ea666230b62b91ab2ff015ce

    SHA1

    8815248fbd6a70505346e9ffd2fe8a6a63435995

    SHA256

    ca3f4d3e23acf9fa7689768c28a41286789994b44e79d8e80d295ca21728b7bc

    SHA512

    6789542a892c3ab1c6d322c1a6f0913206aa81c5966776c3d785ef7a3150a2e4ac4b4f44258704a2052dffe4000c97f26f973509bde8308369ca4cd3c85c1677

  • memory/768-133-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/768-138-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/4316-139-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/4316-150-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.