Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:13

General

  • Target

    b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8.exe

  • Size

    172KB

  • MD5

    445772cadc7038a1fc6a6ac9a913eae8

  • SHA1

    a458e77f891e31a3a72602164578cc7441f9b23c

  • SHA256

    b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8

  • SHA512

    d36a45ddc524f79066897de5fa6bdbd39d4db63440e024dc7a29dcbfc9e5d7388d8025ea5682cf6865df8a5678aca6849292d7beed92a25465373ddaa62d4feb

  • SSDEEP

    3072:F6SFonoVD8oSx/mvXAFIFR7Nzim04f1fhLOG7GQiCLMt8Xt/Wv6mgea:F6coUD8oSx/mvXAFIFR7N7DfhhLOG7Gb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8.exe
    "C:\Users\Admin\AppData\Local\Temp\b906a1e7633074282e957094d692e44466c81e16404f9932f0a3f78168e77ec8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\wauja.exe
      "C:\Users\Admin\wauja.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wauja.exe

    Filesize

    172KB

    MD5

    388f4732a3045ae6c959d5881c5db6ab

    SHA1

    da9ed8091f19d6f65fe6082ad829f305d57b3577

    SHA256

    3bec1e5702ca5ede8164c0c20d8c57e53cf2f21da585e3d44878722c826587cf

    SHA512

    6f035ae45370f14e80bfe0ab813d8d4b285cb6e69be38181a487bfeead3bf3a40036572c8b7a0ee05c62637b71e0987a50f8c70ac206aa59e603e79eebbe4521

  • C:\Users\Admin\wauja.exe

    Filesize

    172KB

    MD5

    388f4732a3045ae6c959d5881c5db6ab

    SHA1

    da9ed8091f19d6f65fe6082ad829f305d57b3577

    SHA256

    3bec1e5702ca5ede8164c0c20d8c57e53cf2f21da585e3d44878722c826587cf

    SHA512

    6f035ae45370f14e80bfe0ab813d8d4b285cb6e69be38181a487bfeead3bf3a40036572c8b7a0ee05c62637b71e0987a50f8c70ac206aa59e603e79eebbe4521