Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
Resource
win10v2004-20220812-en
General
-
Target
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
-
Size
89KB
-
MD5
e982f8207670946d5bcc18581caf6e89
-
SHA1
003881e35f529faaa485e42d78ebd889674412cb
-
SHA256
c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
-
SHA512
d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
SSDEEP
1536:ARFtqMnrgUfv0L6p326kF3CBg72dxNGgSuoCswHW:AflpECBk23UgSuEw2
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 4768 ADBCDEE5E570678.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explorer.lnk c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe -
Loads dropped DLL 1 IoCs
pid Process 4768 ADBCDEE5E570678.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ADBCDEE5E570678 = "C:\\ProgramData\\ADBCDEE5E570678\\ADBCDEE5E570678.exe" c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ADBCDEE5E570678 = "C:\\ProgramData\\ADBCDEE5E570678\\ADBCDEE5E570678.exe" c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3852 ipconfig.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4768 ADBCDEE5E570678.exe 4768 ADBCDEE5E570678.exe 4768 ADBCDEE5E570678.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 488 wrote to memory of 4768 488 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 78 PID 488 wrote to memory of 4768 488 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 78 PID 488 wrote to memory of 4768 488 c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe 78 PID 4768 wrote to memory of 3852 4768 ADBCDEE5E570678.exe 79 PID 4768 wrote to memory of 3852 4768 ADBCDEE5E570678.exe 79 PID 4768 wrote to memory of 3852 4768 ADBCDEE5E570678.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe"C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe"1⤵
- Disables RegEdit via registry modification
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:488 -
C:\ProgramData\ADBCDEE5E570678\ADBCDEE5E570678.exeC:\ProgramData\ADBCDEE5E570678\ADBCDEE5E570678.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns && ipconfig /renew3⤵
- Gathers network information
PID:3852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5e982f8207670946d5bcc18581caf6e89
SHA1003881e35f529faaa485e42d78ebd889674412cb
SHA256c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
SHA512d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
Filesize
89KB
MD5e982f8207670946d5bcc18581caf6e89
SHA1003881e35f529faaa485e42d78ebd889674412cb
SHA256c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56
SHA512d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d
-
Filesize
3KB
MD5e9032dac10fb27acfa89c3357fad86b3
SHA11623843e0d369c9911989c0730a6470c22dd60fd
SHA2569de0bb4cb8a79f575da4dbc86cedb6a9ef8d94c0b176fd4690b9b7ffee078391
SHA51270e663ad1e87832673f7140aca20dcd3db46c256b91f2924e7a9e1ab24a295d432b625fdcc53b1f3bbc84f91390190e4bd483da5285f95ed0316be09b2b82004