Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
206s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:34
Behavioral task
behavioral1
Sample
cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe
Resource
win10v2004-20220812-en
General
-
Target
cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe
-
Size
107KB
-
MD5
d642e90abc8d83d2b82b641e7e527a41
-
SHA1
fc818c4df7054bc6e2cf8f07c9172e2eed12ccc0
-
SHA256
cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b
-
SHA512
ae6b868f7bb35fbc754e2ae62611da8f621ea5ae02132aa7615328ad69facb7610360dbedf50c185273aec85511c5d025e549eabf028763f5a9e08d3d4d2f620
-
SSDEEP
3072:TJa0471ysAjoAFl2bSUvOLw7GKDjxf4HRdoyOoutj0TLThL:danUnFl2bSULaKDjKHRqHoS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2196 000000000.exe 4416 000000000.exe -
resource yara_rule behavioral2/memory/2700-132-0x0000000000400000-0x0000000000503000-memory.dmp upx behavioral2/memory/1604-136-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1604-138-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1604-139-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2700-140-0x0000000000400000-0x0000000000503000-memory.dmp upx behavioral2/memory/1604-141-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1604-142-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0008000000022e0f-144.dat upx behavioral2/files/0x0008000000022e0f-145.dat upx behavioral2/memory/2196-148-0x0000000000400000-0x0000000000503000-memory.dmp upx behavioral2/files/0x0008000000022e0f-151.dat upx behavioral2/memory/2196-155-0x0000000000400000-0x0000000000503000-memory.dmp upx behavioral2/memory/4416-156-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4416-157-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SymRec = "C:\\Users\\Admin\\AppData\\Roaming\\625733395.exe" cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SymRec = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe" cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SymRec = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe" cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2700 set thread context of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2196 set thread context of 4416 2196 000000000.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 2196 000000000.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 2700 wrote to memory of 1604 2700 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 80 PID 1604 wrote to memory of 2196 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 81 PID 1604 wrote to memory of 2196 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 81 PID 1604 wrote to memory of 2196 1604 cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe 81 PID 2196 wrote to memory of 4416 2196 000000000.exe 82 PID 2196 wrote to memory of 4416 2196 000000000.exe 82 PID 2196 wrote to memory of 4416 2196 000000000.exe 82 PID 2196 wrote to memory of 4416 2196 000000000.exe 82 PID 2196 wrote to memory of 4416 2196 000000000.exe 82 PID 2196 wrote to memory of 4416 2196 000000000.exe 82 PID 2196 wrote to memory of 4416 2196 000000000.exe 82 PID 2196 wrote to memory of 4416 2196 000000000.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe"C:\Users\Admin\AppData\Local\Temp\cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exeC:\Users\Admin\AppData\Local\Temp\cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Roaming\000000000.exe"C:\Users\Admin\AppData\Roaming\000000000.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\000000000.exeC:\Users\Admin\AppData\Roaming\000000000.exe4⤵
- Executes dropped EXE
PID:4416
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5d642e90abc8d83d2b82b641e7e527a41
SHA1fc818c4df7054bc6e2cf8f07c9172e2eed12ccc0
SHA256cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b
SHA512ae6b868f7bb35fbc754e2ae62611da8f621ea5ae02132aa7615328ad69facb7610360dbedf50c185273aec85511c5d025e549eabf028763f5a9e08d3d4d2f620
-
Filesize
107KB
MD5d642e90abc8d83d2b82b641e7e527a41
SHA1fc818c4df7054bc6e2cf8f07c9172e2eed12ccc0
SHA256cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b
SHA512ae6b868f7bb35fbc754e2ae62611da8f621ea5ae02132aa7615328ad69facb7610360dbedf50c185273aec85511c5d025e549eabf028763f5a9e08d3d4d2f620
-
Filesize
107KB
MD5d642e90abc8d83d2b82b641e7e527a41
SHA1fc818c4df7054bc6e2cf8f07c9172e2eed12ccc0
SHA256cfc7bc2f271ce50317fe51b708f22005856721c851da2e136802019023690f8b
SHA512ae6b868f7bb35fbc754e2ae62611da8f621ea5ae02132aa7615328ad69facb7610360dbedf50c185273aec85511c5d025e549eabf028763f5a9e08d3d4d2f620