Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
3s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe
Resource
win10v2004-20220812-en
General
-
Target
87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe
-
Size
96KB
-
MD5
d5167afb921f83a91c09f52946764b17
-
SHA1
787a55b0b5ea209292341057c4cbb6cb7a6e8d8a
-
SHA256
87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14
-
SHA512
26d8a871209fc567b3d3de53ea2f0aeb17538062b52946a9417e313e71508242cd36bca9ff8a91e19aeca85c3cf9d522e5a36f941d8fc29a7bfb8b8a028ad34e
-
SSDEEP
3072:W0JwRyxsunlcBKW73E7R3a9EYvhOxCcccuSjzAn4yT5oxEghTrwiBqRToUZZMUNL:W0JwRyxsunlcBKW73E7R3a9EYvhOxCcs
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\eta\hosts 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 2380 taskkill.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.IE\ = "IE" 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\NeverShowExt = "1" 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.IE 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\ = "????" 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE " 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4216 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Token: SeDebugPrivilege 2380 taskkill.exe Token: SeDebugPrivilege 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Token: SeDebugPrivilege 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Token: SeDebugPrivilege 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Token: SeDebugPrivilege 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe Token: SeDebugPrivilege 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2380 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe 75 PID 2228 wrote to memory of 2380 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe 75 PID 2228 wrote to memory of 2380 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe 75 PID 2228 wrote to memory of 3732 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe 78 PID 2228 wrote to memory of 3732 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe 78 PID 2228 wrote to memory of 3732 2228 87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe 78 PID 3732 wrote to memory of 4216 3732 cmd.exe 80 PID 3732 wrote to memory of 4216 3732 cmd.exe 80 PID 3732 wrote to memory of 4216 3732 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe"C:\Users\Admin\AppData\Local\Temp\87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Drivers directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Users\Admin\AppData\Local\Temp\87e93577b89abbd3b6dc7fd57397b390928d7e6f6c8354464e67e7d6fc193f14.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:4216
-
-