Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:34

General

  • Target

    92c62ca077ecdb34b806a4d7e241021826aca752910fd0e1a8c99818ad899af5.exe

  • Size

    148KB

  • MD5

    f44feb8f77c02dea9ba2152db3ecbdfd

  • SHA1

    414e1094e77d3700c930e566fdf663355693a831

  • SHA256

    92c62ca077ecdb34b806a4d7e241021826aca752910fd0e1a8c99818ad899af5

  • SHA512

    c568427662738501d78cd81fb12f374b526aae35a1ce28fa10d9950b5751ff3a0646c1f94df195995f1543799718a810ee4b16fa15ecfccbfa6261871bedded5

  • SSDEEP

    3072:DTBEhyHEr+6dTkon7E1v26H53sW7Jq28f3/o:D5kaQn7o2AB7E3/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92c62ca077ecdb34b806a4d7e241021826aca752910fd0e1a8c99818ad899af5.exe
    "C:\Users\Admin\AppData\Local\Temp\92c62ca077ecdb34b806a4d7e241021826aca752910fd0e1a8c99818ad899af5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Users\Admin\giiudag.exe
      "C:\Users\Admin\giiudag.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\giiudag.exe

    Filesize

    148KB

    MD5

    c94fc5d11c854641f9ac8612c297aeb8

    SHA1

    697d375294ae9499969f23d0eee86c0b4c069451

    SHA256

    9a59a8342e3da1ddb0e6a62bd7d01ccfc5b4045e929d42069b5e3e53e629b402

    SHA512

    575d129c5cfa61df913acdf304b0df4fc05e0347a67c2723ff68d70394be8abf55868017dde23d2cde80b095b89a5f529bb047e1c57e1eaaa43b6cca98dd032b

  • C:\Users\Admin\giiudag.exe

    Filesize

    148KB

    MD5

    c94fc5d11c854641f9ac8612c297aeb8

    SHA1

    697d375294ae9499969f23d0eee86c0b4c069451

    SHA256

    9a59a8342e3da1ddb0e6a62bd7d01ccfc5b4045e929d42069b5e3e53e629b402

    SHA512

    575d129c5cfa61df913acdf304b0df4fc05e0347a67c2723ff68d70394be8abf55868017dde23d2cde80b095b89a5f529bb047e1c57e1eaaa43b6cca98dd032b