Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:52 UTC

General

  • Target

    f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe

  • Size

    132KB

  • MD5

    dfa569dbc47c162600a6fe4dffa7b885

  • SHA1

    fd51f332ad47274a127530a5a6f3b6926002de94

  • SHA256

    f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac

  • SHA512

    8f2d50ea3e4fd4cc75b8f7aa880d357e8833d9078d50e8457620f5b677520455a999653c883dc160cc86887a0d4ad8f4c4d296fe47ecf5e40ca196f52f9bc918

  • SSDEEP

    3072:VeDgqy7TBJVSgpS5uIyio/Conuh1CNvDbibT:VjqoTB2grko/C2gcniv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
    "C:\Users\Admin\AppData\Local\Temp\f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\juoumo.exe
      "C:\Users\Admin\juoumo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4912

Network

  • flag-unknown
    DNS
    ns1.player1532.com
    f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.player1532.com
    IN A
    Response
  • flag-unknown
    DNS
    ns1.videoall.org
    f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.videoall.org
    IN A
    Response
  • 93.184.220.29:80
    322 B
    7
  • 40.79.189.58:443
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 8.247.211.254:80
    322 B
    7
  • 8.247.211.254:80
    322 B
    7
  • 8.8.8.8:53
    ns1.player1532.com
    dns
    f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
    64 B
    137 B
    1
    1

    DNS Request

    ns1.player1532.com

  • 8.8.8.8:53
    ns1.videoall.org
    dns
    f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
    62 B
    144 B
    1
    1

    DNS Request

    ns1.videoall.org

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\juoumo.exe

    Filesize

    132KB

    MD5

    9e26dc3a7a7cafc81e5e870ca242711c

    SHA1

    3e4b6ba964cf7a0b037062584869444b105ee786

    SHA256

    cf10f1a22d670ff4743c24bf8435742a222a41ddd315b17c82381b9daf25ea91

    SHA512

    9c0756014876ddae8d9cfa68324df53ab4c7d779220974c2ea27fe3de879c02f8c3b23dc6456f2bc20ce31ab933dbc0b1c828739485cd94e7666e8502373ebf8

  • C:\Users\Admin\juoumo.exe

    Filesize

    132KB

    MD5

    9e26dc3a7a7cafc81e5e870ca242711c

    SHA1

    3e4b6ba964cf7a0b037062584869444b105ee786

    SHA256

    cf10f1a22d670ff4743c24bf8435742a222a41ddd315b17c82381b9daf25ea91

    SHA512

    9c0756014876ddae8d9cfa68324df53ab4c7d779220974c2ea27fe3de879c02f8c3b23dc6456f2bc20ce31ab933dbc0b1c828739485cd94e7666e8502373ebf8

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.