Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 08:49

General

  • Target

    bd3b71038e86725e3e7439bbdfac38f2fa31ce033d9d9644e6a3d8bab259acd3.exe

  • Size

    105KB

  • MD5

    41d5c4d4c8e72e697e66aa5596a56b6f

  • SHA1

    ef8b75cf1c47c6c9a87db42d2f0228d5df3b69cb

  • SHA256

    bd3b71038e86725e3e7439bbdfac38f2fa31ce033d9d9644e6a3d8bab259acd3

  • SHA512

    bcbb18e1a5b78f1e22a55c63c8351e6e8e4d921dcf29d16ecfdbb7c68a46a836e7040ab3f4b48b69df46829fce7a7e693a1fbf44bfdb994661fdb300a12f38a5

  • SSDEEP

    768:r+KGZdJueOxr1PuarJHlVBQavxWOf+u4Dt0XtCVJGCIzIsaJHRQCAxtXfq:rDGEr1PDVBQiWe+b0X0nEIs0RQtXy

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd3b71038e86725e3e7439bbdfac38f2fa31ce033d9d9644e6a3d8bab259acd3.exe
    "C:\Users\Admin\AppData\Local\Temp\bd3b71038e86725e3e7439bbdfac38f2fa31ce033d9d9644e6a3d8bab259acd3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul
      2⤵
        PID:4880

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\a..bat

      Filesize

      274B

      MD5

      723d585b4b7ecf6c41708a93ae657a66

      SHA1

      61af74b837335daf3c2cc51d86d701c001892989

      SHA256

      22a01fc6e9fb28a895c4e049321cf69e1bc119f52e3fa1a796c51a9dece0b969

      SHA512

      eb19afc604650c60838dfa35aa77b3d7e42a142b483ff430af32b341b20bae18e82ead249f67a9310ed6ef44f6c87de380fbb9f1162a491e98de67a1d4413a00

    • memory/2824-132-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/2824-134-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB