Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    172s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 02:52

General

  • Target

    af6d25c4c5a6c455ab1a4075faa792ce0a826e5e9268053d6e76256c08cc217b.exe

  • Size

    300KB

  • MD5

    95a952d907ca9cbc38e437379b7d3285

  • SHA1

    7380fcef52de33f15e9d9cba64568a9d6c371bae

  • SHA256

    af6d25c4c5a6c455ab1a4075faa792ce0a826e5e9268053d6e76256c08cc217b

  • SHA512

    3fa11e9c6d941bd768f47f47cbfa9b5e83794d897ca05d958b4916d53adf1183bd1d92b3cffc331bf4cbe96e47705f891b3bc086de8d41c499bc83ab70f7b910

  • SSDEEP

    6144:yFnIej3A6VDkVhzK87Znl2OSs3ntsDzy1yOFmwWXE7MG71P9:yyej3JDkfZoOSFzVQmLE7MQ1l

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af6d25c4c5a6c455ab1a4075faa792ce0a826e5e9268053d6e76256c08cc217b.exe
    "C:\Users\Admin\AppData\Local\Temp\af6d25c4c5a6c455ab1a4075faa792ce0a826e5e9268053d6e76256c08cc217b.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create mailmsg32 type= share start= auto DisplayName= "Mail Message Objects DLL" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\mailmsg32.dll,yqet"
      2⤵
      • Launches sc.exe
      PID:3568
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description mailmsg32 "Mail Message Objects DLL"
      2⤵
      • Launches sc.exe
      PID:1780
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall add portopening TCP 1711 messenger
      2⤵
      • Modifies Windows Firewall
      PID:2604
    • C:\Users\Admin\AppData\Local\Temp\2822f9af.exe
      "C:\Users\Admin\AppData\Local\Temp\2822f9af.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2822f9af.exe

    Filesize

    223KB

    MD5

    f4a1c1fc02ed4e6b1c497411504e8aac

    SHA1

    ba401d462368d2a3a6af2c20f44d6e39a598fed1

    SHA256

    70961f84c42a1454ff44bfa216ef3403fe711e4cc3399ded5dc586db1791858d

    SHA512

    2b70c30339d70fbc6227cba58f3712dabbb1b7cec7cb225ec16f06a6afb8dc522dbc7cdb5e0cb54d7525dc022f60a60e800207f9ee535bb485bcf6b286e54fca

  • C:\Users\Admin\AppData\Local\Temp\2822f9af.exe

    Filesize

    223KB

    MD5

    f4a1c1fc02ed4e6b1c497411504e8aac

    SHA1

    ba401d462368d2a3a6af2c20f44d6e39a598fed1

    SHA256

    70961f84c42a1454ff44bfa216ef3403fe711e4cc3399ded5dc586db1791858d

    SHA512

    2b70c30339d70fbc6227cba58f3712dabbb1b7cec7cb225ec16f06a6afb8dc522dbc7cdb5e0cb54d7525dc022f60a60e800207f9ee535bb485bcf6b286e54fca

  • memory/4512-132-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4512-138-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4880-141-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/4880-143-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB