Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe
Resource
win10v2004-20220812-en
General
-
Target
e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe
-
Size
501KB
-
MD5
e40043ca830f0cb77887f8e1e1d5cbe2
-
SHA1
7316e9ea61c83a28f0d5cc37690cc3f9fff72cc0
-
SHA256
e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f
-
SHA512
eac0bb945ee52a6e457a710df5ea6f11d839102e1ae6abdb2f1a2db724c4989c39ed0f20e82b7e409f3876169e9ca325736ea88ff0726d873f608509ed40943d
-
SSDEEP
12288:d6TcTq0rfJDGv5rwiglwHZcyDyGXuwNR9nu/yqeD:+Qq+Gv5rw7kZpDXewFu6qe
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RDSound = "C:\\Users\\Admin\\AppData\\Roaming\\Huawei3gConect.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3CE3AAB8-75CB-11ED-B696-5A10AEE59B4B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4872 reg.exe 4300 reg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5012 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5012 iexplore.exe 5012 iexplore.exe 4608 IEXPLORE.EXE 4608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2900 1224 e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe 80 PID 1224 wrote to memory of 2900 1224 e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe 80 PID 1224 wrote to memory of 2900 1224 e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe 80 PID 1224 wrote to memory of 4396 1224 e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe 82 PID 1224 wrote to memory of 4396 1224 e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe 82 PID 1224 wrote to memory of 4396 1224 e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe 82 PID 2900 wrote to memory of 4872 2900 cmd.exe 84 PID 2900 wrote to memory of 4872 2900 cmd.exe 84 PID 2900 wrote to memory of 4872 2900 cmd.exe 84 PID 4396 wrote to memory of 5076 4396 cmd.exe 85 PID 4396 wrote to memory of 5076 4396 cmd.exe 85 PID 4396 wrote to memory of 5076 4396 cmd.exe 85 PID 5076 wrote to memory of 4300 5076 cmd.exe 86 PID 5076 wrote to memory of 4300 5076 cmd.exe 86 PID 5076 wrote to memory of 4300 5076 cmd.exe 86 PID 5012 wrote to memory of 4608 5012 iexplore.exe 89 PID 5012 wrote to memory of 4608 5012 iexplore.exe 89 PID 5012 wrote to memory of 4608 5012 iexplore.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe"C:\Users\Admin\AppData\Local\Temp\e6a0e25a6cc046b54a861de9d9692391827a6a1ae37924ea4b2389f27e131d7f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Nreg.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RDSound /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Huawei3gConect.exe" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\NUac.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:4300
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1824
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5012 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD5c80c14c9b9ffd63a2ed8037940d75103
SHA13f24e10b213bd483067709c8c4f7b75c29464eff
SHA256236f2acb03d56106f0e6b693108f25ed2eb9b7d0503a84e6948e797f8c15dd6b
SHA512f51619a769fc86bc091bd1a534c6cac5d8c426ddd9784fd98bb23b7f0c699fcc473722dffa1196391c3e92f4647ce96de4b3326c25f49014552b0346a6f4e2c9
-
Filesize
124B
MD55dcd3f0dbe707b6c4c54020c88f722cd
SHA19343cc6c911f5a80a010d501428ce9a347acfcf2
SHA2564e61546611506a8f677c6e45e4c8124a5a2f0a7c4a0525bbcb5b590fd23ab345
SHA512a44eb7fffba50a852590e0f3d7505f0120a2bdde67839eddcd50e84a44f4b6e0f7b867533694f153432534a7bb52aac0a4471a086d2d10881a839501bc4cbfaa