Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 08:42
Behavioral task
behavioral1
Sample
238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe
Resource
win10v2004-20220812-en
General
-
Target
238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe
-
Size
393KB
-
MD5
53fb4a3b26d43ad7192f374452eacb7d
-
SHA1
031853042d0b205117be47c6d92cc580c6b56ce7
-
SHA256
238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd
-
SHA512
f20683d2395a8c06bf1fcf69eaa8016f5d3a878b04128181526c5a6da7d45fb52ea898d2aecf4daa0c5fa56bf69c5515b8ee4f3c12744fbd78f9510d3579a458
-
SSDEEP
6144:ZBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHC+4VL6eHn3ttqPgJog:ZBMmKGnhDT+JlCLRueH3rz
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 220 svchost.exe 4228 svchost.exe 1996 svchost.exe 1260 svchost.exe -
resource yara_rule behavioral2/memory/4956-132-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/memory/4956-137-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/files/0x000300000001e2cd-141.dat upx behavioral2/files/0x000300000001e2cd-139.dat upx behavioral2/files/0x000300000001e2cd-142.dat upx behavioral2/memory/4956-144-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/files/0x000300000001e2cd-146.dat upx behavioral2/memory/4228-154-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/memory/220-153-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/files/0x000300000001e2cd-150.dat upx behavioral2/memory/4228-157-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral2/memory/220-159-0x0000000000400000-0x00000000004CF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Generic Win32 Host Process = "C:\\Windows\\system\\svchost.exe" 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Generic Win32 Host Process = "C:\\Windows\\system\\svchost.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Generic Win32 Host Process = "C:\\Windows\\system\\svchost.exe" svchost.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: svchost.exe File opened (read-only) \??\l: svchost.exe File opened (read-only) \??\z: svchost.exe File opened (read-only) \??\e: svchost.exe File opened (read-only) \??\h: svchost.exe File opened (read-only) \??\k: svchost.exe File opened (read-only) \??\m: svchost.exe File opened (read-only) \??\z: svchost.exe File opened (read-only) \??\b: svchost.exe File opened (read-only) \??\g: svchost.exe File opened (read-only) \??\q: svchost.exe File opened (read-only) \??\b: svchost.exe File opened (read-only) \??\m: svchost.exe File opened (read-only) \??\w: svchost.exe File opened (read-only) \??\r: svchost.exe File opened (read-only) \??\p: svchost.exe File opened (read-only) \??\q: svchost.exe File opened (read-only) \??\t: svchost.exe File opened (read-only) \??\v: svchost.exe File opened (read-only) \??\o: svchost.exe File opened (read-only) \??\s: svchost.exe File opened (read-only) \??\u: svchost.exe File opened (read-only) \??\f: svchost.exe File opened (read-only) \??\t: svchost.exe File opened (read-only) \??\f: svchost.exe File opened (read-only) \??\h: svchost.exe File opened (read-only) \??\y: svchost.exe File opened (read-only) \??\a: svchost.exe File opened (read-only) \??\i: svchost.exe File opened (read-only) \??\j: svchost.exe File opened (read-only) \??\p: svchost.exe File opened (read-only) \??\u: svchost.exe File opened (read-only) \??\v: svchost.exe File opened (read-only) \??\x: svchost.exe File opened (read-only) \??\y: svchost.exe File opened (read-only) \??\l: svchost.exe File opened (read-only) \??\s: svchost.exe File opened (read-only) \??\w: svchost.exe File opened (read-only) \??\x: svchost.exe File opened (read-only) \??\o: svchost.exe File opened (read-only) \??\k: svchost.exe File opened (read-only) \??\n: svchost.exe File opened (read-only) \??\r: svchost.exe File opened (read-only) \??\a: svchost.exe File opened (read-only) \??\n: svchost.exe File opened (read-only) \??\g: svchost.exe File opened (read-only) \??\i: svchost.exe File opened (read-only) \??\j: svchost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4956-137-0x0000000000400000-0x00000000004CF000-memory.dmp autoit_exe behavioral2/memory/4956-144-0x0000000000400000-0x00000000004CF000-memory.dmp autoit_exe behavioral2/memory/4228-154-0x0000000000400000-0x00000000004CF000-memory.dmp autoit_exe behavioral2/memory/220-153-0x0000000000400000-0x00000000004CF000-memory.dmp autoit_exe behavioral2/memory/4228-157-0x0000000000400000-0x00000000004CF000-memory.dmp autoit_exe behavioral2/memory/220-159-0x0000000000400000-0x00000000004CF000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4956 set thread context of 4652 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 82 PID 220 set thread context of 1996 220 svchost.exe 88 PID 4228 set thread context of 1260 4228 svchost.exe 89 -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\system\2u12pbO3Ec5npc01If9vFZc31ynIwLFV3kreXJj9.exe svchost.exe File opened for modification C:\Windows\system\2u12pbO3Ec5npc01If9vFZc31ynIwLFV3kreXJj9.exe svchost.exe File created C:\Windows\system\2u12pbO3Ec5npc01If9vFZc31ynIwLFV3kreXJj9.exe svchost.exe File opened for modification C:\Windows\system\2u12pbO3Ec5npc01If9vFZc31ynIwLFV3kreXJj9.exe svchost.exe File created C:\Windows\system\2u12pbO3Ec5npc01If9vFZc31ynIwLFV3kreXJj9.exe 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe File opened for modification C:\Windows\system\2u12pbO3Ec5npc01If9vFZc31ynIwLFV3kreXJj9.exe 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe File created C:\Windows\system\svchost.exe 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 220 svchost.exe 220 svchost.exe 4228 svchost.exe 4228 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4652 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 82 PID 4956 wrote to memory of 4652 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 82 PID 4956 wrote to memory of 4652 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 82 PID 4956 wrote to memory of 4652 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 82 PID 4956 wrote to memory of 4652 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 82 PID 4956 wrote to memory of 4652 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 82 PID 4956 wrote to memory of 220 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 86 PID 4956 wrote to memory of 220 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 86 PID 4956 wrote to memory of 220 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 86 PID 4956 wrote to memory of 4228 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 87 PID 4956 wrote to memory of 4228 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 87 PID 4956 wrote to memory of 4228 4956 238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe 87 PID 220 wrote to memory of 1996 220 svchost.exe 88 PID 220 wrote to memory of 1996 220 svchost.exe 88 PID 220 wrote to memory of 1996 220 svchost.exe 88 PID 220 wrote to memory of 1996 220 svchost.exe 88 PID 220 wrote to memory of 1996 220 svchost.exe 88 PID 220 wrote to memory of 1996 220 svchost.exe 88 PID 4228 wrote to memory of 1260 4228 svchost.exe 89 PID 4228 wrote to memory of 1260 4228 svchost.exe 89 PID 4228 wrote to memory of 1260 4228 svchost.exe 89 PID 4228 wrote to memory of 1260 4228 svchost.exe 89 PID 4228 wrote to memory of 1260 4228 svchost.exe 89 PID 4228 wrote to memory of 1260 4228 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe"C:\Users\Admin\AppData\Local\Temp\238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe"C:\Users\Admin\AppData\Local\Temp\238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd.exe"2⤵PID:4652
-
-
C:\Windows\system\svchost.exeC:\Windows\system\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system\svchost.exe"C:\Windows\system\svchost.exe"3⤵
- Executes dropped EXE
PID:1996
-
-
-
C:\Windows\system\svchost.exeC:\Windows\system\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\system\svchost.exe"C:\Windows\system\svchost.exe"3⤵
- Executes dropped EXE
PID:1260
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD553fb4a3b26d43ad7192f374452eacb7d
SHA1031853042d0b205117be47c6d92cc580c6b56ce7
SHA256238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd
SHA512f20683d2395a8c06bf1fcf69eaa8016f5d3a878b04128181526c5a6da7d45fb52ea898d2aecf4daa0c5fa56bf69c5515b8ee4f3c12744fbd78f9510d3579a458
-
Filesize
393KB
MD553fb4a3b26d43ad7192f374452eacb7d
SHA1031853042d0b205117be47c6d92cc580c6b56ce7
SHA256238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd
SHA512f20683d2395a8c06bf1fcf69eaa8016f5d3a878b04128181526c5a6da7d45fb52ea898d2aecf4daa0c5fa56bf69c5515b8ee4f3c12744fbd78f9510d3579a458
-
Filesize
393KB
MD553fb4a3b26d43ad7192f374452eacb7d
SHA1031853042d0b205117be47c6d92cc580c6b56ce7
SHA256238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd
SHA512f20683d2395a8c06bf1fcf69eaa8016f5d3a878b04128181526c5a6da7d45fb52ea898d2aecf4daa0c5fa56bf69c5515b8ee4f3c12744fbd78f9510d3579a458
-
Filesize
393KB
MD553fb4a3b26d43ad7192f374452eacb7d
SHA1031853042d0b205117be47c6d92cc580c6b56ce7
SHA256238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd
SHA512f20683d2395a8c06bf1fcf69eaa8016f5d3a878b04128181526c5a6da7d45fb52ea898d2aecf4daa0c5fa56bf69c5515b8ee4f3c12744fbd78f9510d3579a458
-
Filesize
393KB
MD553fb4a3b26d43ad7192f374452eacb7d
SHA1031853042d0b205117be47c6d92cc580c6b56ce7
SHA256238e286a3bca4af0e1294a4cb13d17de6b922df4570a98a99ce550c88596f4cd
SHA512f20683d2395a8c06bf1fcf69eaa8016f5d3a878b04128181526c5a6da7d45fb52ea898d2aecf4daa0c5fa56bf69c5515b8ee4f3c12744fbd78f9510d3579a458