Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 07:22

General

  • Target

    c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe

  • Size

    89KB

  • MD5

    e982f8207670946d5bcc18581caf6e89

  • SHA1

    003881e35f529faaa485e42d78ebd889674412cb

  • SHA256

    c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

  • SHA512

    d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

  • SSDEEP

    1536:ARFtqMnrgUfv0L6p326kF3CBg72dxNGgSuoCswHW:AflpECBk23UgSuEw2

Score
8/10

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
    "C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\ProgramData\ADBCDEE5E570678\ADBCDEE5E570678.exe
      C:\ProgramData\ADBCDEE5E570678\ADBCDEE5E570678.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /flushdns && ipconfig /renew
        3⤵
        • Gathers network information
        PID:3852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ADBCDEE5E570678\ADBCDEE5E570678.exe

    Filesize

    89KB

    MD5

    e982f8207670946d5bcc18581caf6e89

    SHA1

    003881e35f529faaa485e42d78ebd889674412cb

    SHA256

    c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

    SHA512

    d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

  • C:\ProgramData\ADBCDEE5E570678\ADBCDEE5E570678.exe

    Filesize

    89KB

    MD5

    e982f8207670946d5bcc18581caf6e89

    SHA1

    003881e35f529faaa485e42d78ebd889674412cb

    SHA256

    c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

    SHA512

    d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

  • C:\Users\Admin\AppData\Roaming\twain.dll

    Filesize

    3KB

    MD5

    e9032dac10fb27acfa89c3357fad86b3

    SHA1

    1623843e0d369c9911989c0730a6470c22dd60fd

    SHA256

    9de0bb4cb8a79f575da4dbc86cedb6a9ef8d94c0b176fd4690b9b7ffee078391

    SHA512

    70e663ad1e87832673f7140aca20dcd3db46c256b91f2924e7a9e1ab24a295d432b625fdcc53b1f3bbc84f91390190e4bd483da5285f95ed0316be09b2b82004

  • memory/488-132-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/488-136-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4768-137-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4768-140-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB