Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:05

General

  • Target

    de958c626bc685b0d2d3ec699724756fc31180cc509e3b89f3c3eb60a69fed21.exe

  • Size

    200KB

  • MD5

    de08835d3798a3be168358b84515d39a

  • SHA1

    c1d9cec4bde20b7acec134b4ed135a719f74cdd8

  • SHA256

    de958c626bc685b0d2d3ec699724756fc31180cc509e3b89f3c3eb60a69fed21

  • SHA512

    b9bcf9342b84b26bb25b2c99c82ba72d61e4668db0dd8daf5af93fda09db280c8004a15d3de0ad2b3b039ad03693c315032813ba8e2661791307f0d5fc32abf7

  • SSDEEP

    6144:LmewpWymPBeaSAOJ+7xi5eRed63qaCR8nIBZ:6eELmPBeaSAOJ+7xi5eRed63qaC

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de958c626bc685b0d2d3ec699724756fc31180cc509e3b89f3c3eb60a69fed21.exe
    "C:\Users\Admin\AppData\Local\Temp\de958c626bc685b0d2d3ec699724756fc31180cc509e3b89f3c3eb60a69fed21.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Users\Admin\leuip.exe
      "C:\Users\Admin\leuip.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\leuip.exe

    Filesize

    200KB

    MD5

    4f661090b23ace09097917eff8f09b77

    SHA1

    fb3a4a42860609976bf14395a1b3fea7f1dd0cf4

    SHA256

    88e0db75fa625449e02ceaf3e111e3eec5c93be00a970859239a984fcf4156c0

    SHA512

    fb2af5f6fae504a3ed4d7d6c639a62f31344aaee7712f5148270f13c730e722d90cd4c26995b7da2634e236a8e81ad3142eabdfd87b1041b83166bf03eea1942

  • C:\Users\Admin\leuip.exe

    Filesize

    200KB

    MD5

    4f661090b23ace09097917eff8f09b77

    SHA1

    fb3a4a42860609976bf14395a1b3fea7f1dd0cf4

    SHA256

    88e0db75fa625449e02ceaf3e111e3eec5c93be00a970859239a984fcf4156c0

    SHA512

    fb2af5f6fae504a3ed4d7d6c639a62f31344aaee7712f5148270f13c730e722d90cd4c26995b7da2634e236a8e81ad3142eabdfd87b1041b83166bf03eea1942