Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe
Resource
win10v2004-20220812-en
General
-
Target
cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe
-
Size
714KB
-
MD5
e0912b352fc80c40bdf45903c00cd0a4
-
SHA1
82e04df444b21c11e7378cfe6516d2b9e9f9c94d
-
SHA256
cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8
-
SHA512
6afbe05778e22b86544a8b628854ebb2507cc276f2a361ba155a390fab3d4e43f7dd14a74b0606610d0336a41cef4d2d7ba66c31fbd23d8559146fc32c3b56f6
-
SSDEEP
3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1872 winlogon.exe 3936 winlogon.exe 3800 winlogon.exe -
resource yara_rule behavioral2/memory/704-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/704-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/704-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/704-144-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3936-149-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3936-150-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3936-153-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3936-154-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1376 set thread context of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1872 set thread context of 3936 1872 winlogon.exe 86 PID 3936 set thread context of 3800 3936 winlogon.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3608 3800 WerFault.exe 87 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 704 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 3936 winlogon.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1376 wrote to memory of 4884 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 79 PID 1376 wrote to memory of 4884 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 79 PID 1376 wrote to memory of 4884 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 79 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 1376 wrote to memory of 704 1376 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 80 PID 704 wrote to memory of 1872 704 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 84 PID 704 wrote to memory of 1872 704 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 84 PID 704 wrote to memory of 1872 704 cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe 84 PID 1872 wrote to memory of 5116 1872 winlogon.exe 85 PID 1872 wrote to memory of 5116 1872 winlogon.exe 85 PID 1872 wrote to memory of 5116 1872 winlogon.exe 85 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 1872 wrote to memory of 3936 1872 winlogon.exe 86 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87 PID 3936 wrote to memory of 3800 3936 winlogon.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe"C:\Users\Admin\AppData\Local\Temp\cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:5116
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 126⤵
- Program crash
PID:3608
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3800 -ip 38001⤵PID:3452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
714KB
MD5e0912b352fc80c40bdf45903c00cd0a4
SHA182e04df444b21c11e7378cfe6516d2b9e9f9c94d
SHA256cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8
SHA5126afbe05778e22b86544a8b628854ebb2507cc276f2a361ba155a390fab3d4e43f7dd14a74b0606610d0336a41cef4d2d7ba66c31fbd23d8559146fc32c3b56f6
-
Filesize
714KB
MD5e0912b352fc80c40bdf45903c00cd0a4
SHA182e04df444b21c11e7378cfe6516d2b9e9f9c94d
SHA256cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8
SHA5126afbe05778e22b86544a8b628854ebb2507cc276f2a361ba155a390fab3d4e43f7dd14a74b0606610d0336a41cef4d2d7ba66c31fbd23d8559146fc32c3b56f6
-
Filesize
714KB
MD5e0912b352fc80c40bdf45903c00cd0a4
SHA182e04df444b21c11e7378cfe6516d2b9e9f9c94d
SHA256cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8
SHA5126afbe05778e22b86544a8b628854ebb2507cc276f2a361ba155a390fab3d4e43f7dd14a74b0606610d0336a41cef4d2d7ba66c31fbd23d8559146fc32c3b56f6
-
Filesize
714KB
MD5e0912b352fc80c40bdf45903c00cd0a4
SHA182e04df444b21c11e7378cfe6516d2b9e9f9c94d
SHA256cd1e8f0773d893a1453245fa80b1a390f317aafa5feb61c290ac393950cc69b8
SHA5126afbe05778e22b86544a8b628854ebb2507cc276f2a361ba155a390fab3d4e43f7dd14a74b0606610d0336a41cef4d2d7ba66c31fbd23d8559146fc32c3b56f6