Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe
Resource
win10v2004-20221111-en
General
-
Target
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe
-
Size
28KB
-
MD5
cf30cadcc6f0c10f10a0419fda865327
-
SHA1
7ebf460c9a5eab25a80916921c3c86009f4228f3
-
SHA256
ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b
-
SHA512
4dd39a99c1098e5bc4be69c735f4ef5109c7eee7359a409e4e46e7bb40a843d50c5a3f16ce4615c250056473553a2dc92baf350a38759cd1b96e143312fe5cfa
-
SSDEEP
384:tO7wbQPHeUNqrQJdZWUheXM9US61RtDw4nUbQC+:tOxHnfFwzXB4+
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\tempfile.jpg ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe File created C:\Windows\battemp.bat ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe File opened for modification C:\Windows\tempeje.exe ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 3484 reg.exe 1112 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2076 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2384 2076 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe 89 PID 2076 wrote to memory of 2384 2076 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe 89 PID 2076 wrote to memory of 2384 2076 ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe 89 PID 2384 wrote to memory of 3484 2384 cmd.exe 91 PID 2384 wrote to memory of 3484 2384 cmd.exe 91 PID 2384 wrote to memory of 3484 2384 cmd.exe 91 PID 2384 wrote to memory of 1112 2384 cmd.exe 92 PID 2384 wrote to memory of 1112 2384 cmd.exe 92 PID 2384 wrote to memory of 1112 2384 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe"C:\Users\Admin\AppData\Local\Temp\ba980f65ba3792c07de4c0e4ff1a817d21c9b587b5b0990227c7920a1e9e206b.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\battemp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /F3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:3484
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /F3⤵
- Modifies registry key
PID:1112
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD58214bcaa0c917e60f9bbef8b865f0f26
SHA1340946ae2b1ebf7ec45f7884488af5004f4b9f0f
SHA2564cd9ce47757c0a2a3d750e96c1abb1f5dbba5301c73c4b29416248cb2c9e39f0
SHA512bfe80e6376edfb115c1fa96e704c5ef4e7c0a6baec83531ba96eb1cc0cb09e5355254cd2882241dd1e527121105ec26b8d9d2241ffa4872a331f4ebbacb464ff