Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 01:49 UTC

General

  • Target

    b05d92292804703e2b33c040d2dcebaf44043e919767d5a2419b202fcc98d1e7.exe

  • Size

    339KB

  • MD5

    6ce7acab2e408d565191bedb879ea1de

  • SHA1

    50bc4325c19c627d530183e36bae3943549dd732

  • SHA256

    b05d92292804703e2b33c040d2dcebaf44043e919767d5a2419b202fcc98d1e7

  • SHA512

    b97962e885dc5b35c6e01e5ca571c62016dd01fe20029b2c1a2cdff8bae5d04853ca64d9e9dc9e0e422043b4c4f96832e1aee92d3efd79fa46b27820a436656f

  • SSDEEP

    6144:GFJ01TQgvy5DnUbrnu9hxEgUOQVF9NC2dMpbpNDZS7:faDnUXEhjNQy2ytxS7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b05d92292804703e2b33c040d2dcebaf44043e919767d5a2419b202fcc98d1e7.exe
    "C:\Users\Admin\AppData\Local\Temp\b05d92292804703e2b33c040d2dcebaf44043e919767d5a2419b202fcc98d1e7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\AppData\Local\Temp\beeiccjhdh.exe
      C:\Users\Admin\AppData\Local\Temp\beeiccjhdh.exe 9\5\8\0\2\9\3\2\6\9\9 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3912
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81670418013.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81670418013.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3332
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81670418013.txt bios get version
        3⤵
          PID:4848
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81670418013.txt bios get version
          3⤵
            PID:4792
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81670418013.txt bios get version
            3⤵
              PID:3924
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 916
              3⤵
              • Program crash
              PID:4380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3912 -ip 3912
          1⤵
            PID:556

          Network

          • flag-unknown
            DNS
            srv.desk-top-app.info
            beeiccjhdh.exe
            Remote address:
            8.8.8.8:53
            Request
            srv.desk-top-app.info
            IN A
            Response
          • flag-unknown
            DNS
            96.108.152.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            96.108.152.52.in-addr.arpa
            IN PTR
            Response
          • flag-unknown
            DNS
            106.89.54.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            106.89.54.20.in-addr.arpa
            IN PTR
            Response
          • 209.197.3.8:80
            52 B
            1
          • 93.184.220.29:80
            322 B
            7
          • 93.184.220.29:80
            322 B
            7
          • 8.253.225.254:80
            322 B
            7
          • 8.253.225.254:80
            322 B
            7
          • 93.184.220.29:80
            260 B
            5
          • 209.197.3.8:80
            322 B
            7
          • 209.197.3.8:80
            260 B
            5
          • 8.8.8.8:53
            srv.desk-top-app.info
            dns
            beeiccjhdh.exe
            67 B
            146 B
            1
            1

            DNS Request

            srv.desk-top-app.info

          • 8.8.8.8:53
            96.108.152.52.in-addr.arpa
            dns
            72 B
            146 B
            1
            1

            DNS Request

            96.108.152.52.in-addr.arpa

          • 8.8.8.8:53
            106.89.54.20.in-addr.arpa
            dns
            71 B
            157 B
            1
            1

            DNS Request

            106.89.54.20.in-addr.arpa

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81670418013.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81670418013.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\81670418013.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\81670418013.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\81670418013.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\beeiccjhdh.exe

            Filesize

            538KB

            MD5

            98440ee9d38ea0423df9f6d65084789c

            SHA1

            ea319c12cf719c67ce4ae878481dcad3381ff00b

            SHA256

            84c8c35b8c3b03e4f2a778fc35535856722ca2cb12141d6dd7e1339e56113e08

            SHA512

            5ef72791524849703289cd67a3be9b184426acbe5e3db9be055bab65ced4b8dfbe159e97e5a6ce519ac009de63647b1ee5e7c61086856429a305c1c2392705d1

          • C:\Users\Admin\AppData\Local\Temp\beeiccjhdh.exe

            Filesize

            538KB

            MD5

            98440ee9d38ea0423df9f6d65084789c

            SHA1

            ea319c12cf719c67ce4ae878481dcad3381ff00b

            SHA256

            84c8c35b8c3b03e4f2a778fc35535856722ca2cb12141d6dd7e1339e56113e08

            SHA512

            5ef72791524849703289cd67a3be9b184426acbe5e3db9be055bab65ced4b8dfbe159e97e5a6ce519ac009de63647b1ee5e7c61086856429a305c1c2392705d1

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.