Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 09:48
Behavioral task
behavioral1
Sample
f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe
Resource
win10v2004-20221111-en
General
-
Target
f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe
-
Size
273KB
-
MD5
c7a7cf64fb49f2a066da34a7f78fe977
-
SHA1
537eac4c5324aa3be30ac19d49ba8397ed9d8474
-
SHA256
f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d
-
SHA512
35b87de7b1d1063f0cf85325770d0c429fbe3e8cf237a8c3a52929e64869972bbea0fe476415c979a683117eaeae8b0be6943c5313d7775333df91fa58bcdc74
-
SSDEEP
6144:S8UEj2jCkegTOZeOmBxZ86fwMB49fAxHwkX2lYVe5EBDZUE0k4g9IwoSb:S8U1+go0xZDA9fpkmge+DZUPkF3oSb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\google\\google.exe" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2812 google.exe 984 google.exe -
resource yara_rule upx behavioral2/memory/532-133-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral2/memory/532-149-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral2/files/0x000a000000022e52-151.dat upx behavioral2/files/0x000a000000022e52-152.dat upx behavioral2/memory/532-153-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral2/memory/2812-156-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral2/memory/984-159-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/files/0x000a000000022e52-160.dat upx behavioral2/memory/984-162-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2812-163-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral2/memory/984-164-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/984-167-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/984-168-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google = "C:\\Windows\\google\\google.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\google = "C:\\Windows\\google\\google.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA google.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2812 set thread context of 0 2812 google.exe PID 2812 set thread context of 984 2812 google.exe 98 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\google\google.exe google.exe File created C:\Windows\google\google.txt f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe File opened for modification C:\Windows\google\google.txt f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe File created C:\Windows\google\google.exe f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe File opened for modification C:\Windows\google\google.exe google.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 984 google.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 2812 google.exe 2812 google.exe 984 google.exe 984 google.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 532 wrote to memory of 3896 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 83 PID 532 wrote to memory of 3896 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 83 PID 532 wrote to memory of 3896 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 83 PID 3896 wrote to memory of 4664 3896 cmd.exe 86 PID 3896 wrote to memory of 4664 3896 cmd.exe 86 PID 3896 wrote to memory of 4664 3896 cmd.exe 86 PID 3896 wrote to memory of 3936 3896 cmd.exe 87 PID 3896 wrote to memory of 3936 3896 cmd.exe 87 PID 3896 wrote to memory of 3936 3896 cmd.exe 87 PID 532 wrote to memory of 3884 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 88 PID 532 wrote to memory of 3884 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 88 PID 532 wrote to memory of 3884 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 88 PID 3884 wrote to memory of 4068 3884 cmd.exe 90 PID 3884 wrote to memory of 4068 3884 cmd.exe 90 PID 3884 wrote to memory of 4068 3884 cmd.exe 90 PID 532 wrote to memory of 1780 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 91 PID 532 wrote to memory of 1780 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 91 PID 532 wrote to memory of 1780 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 91 PID 1780 wrote to memory of 916 1780 cmd.exe 93 PID 1780 wrote to memory of 916 1780 cmd.exe 93 PID 1780 wrote to memory of 916 1780 cmd.exe 93 PID 532 wrote to memory of 1448 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 94 PID 532 wrote to memory of 1448 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 94 PID 532 wrote to memory of 1448 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 94 PID 1448 wrote to memory of 2948 1448 cmd.exe 96 PID 1448 wrote to memory of 2948 1448 cmd.exe 96 PID 1448 wrote to memory of 2948 1448 cmd.exe 96 PID 532 wrote to memory of 2812 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 97 PID 532 wrote to memory of 2812 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 97 PID 532 wrote to memory of 2812 532 f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe 97 PID 2812 wrote to memory of 0 2812 google.exe PID 2812 wrote to memory of 0 2812 google.exe PID 2812 wrote to memory of 0 2812 google.exe PID 2812 wrote to memory of 0 2812 google.exe PID 2812 wrote to memory of 0 2812 google.exe PID 2812 wrote to memory of 984 2812 google.exe 98 PID 2812 wrote to memory of 984 2812 google.exe 98 PID 2812 wrote to memory of 984 2812 google.exe 98 PID 2812 wrote to memory of 984 2812 google.exe 98 PID 2812 wrote to memory of 984 2812 google.exe 98 PID 2812 wrote to memory of 984 2812 google.exe 98 PID 2812 wrote to memory of 984 2812 google.exe 98 PID 2812 wrote to memory of 984 2812 google.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe"C:\Users\Admin\AppData\Local\Temp\f0fde91f35e72918f5d56739d9c0d98e8d359b8cf78243d5500f3ce27c08be8d.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OUACJF.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f3⤵PID:4664
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ErsKS.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "google" /t REG_SZ /d "C:\Windows\google\google.exe" /f3⤵
- Adds Run key to start application
PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rVgNV.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "google" /t REG_SZ /d "C:\Windows\google\google.exe" /f3⤵
- Adds Run key to start application
PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BhokQ.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "Explorer.exe, C:\Windows\google\google.exe" /f3⤵
- Modifies WinLogon for persistence
PID:2948
-
-
-
C:\Windows\google\google.exe"C:\Windows\google\google.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\google\google.exeC:\Windows\google\google.exe3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD5231b3bcf0c27ebf8105042a52c5e5237
SHA1bfd1cb997d4c9f0384bc491b36cbea716f3c110c
SHA256ed9ba1d2e7d1af35cb4bc819d617792034413e9081e38f29875397b86411e6dc
SHA51242654cce0464035a88e3f0243769e7c13eee0d8f4e8caed80f56ef56a5c68468bbed37397912aa61bbd9c4eee56ec747086988208be37d10a06e6f788fd5ea44
-
Filesize
121B
MD5cacbedc0e43d91ca35ee1746830ee6ef
SHA13a1fa382f5794bbd7b0a304e411ead0b9b1c1e89
SHA256afc5fa77872b3692d8cfad640cb783f2df6f3024c216521c289ef7e8085b4408
SHA512dd560b695e7d4d7dfc3486d8b0b0310a7229fbb5e3e36c014b8f7d52331134076b59d59fd51bf6ff51d511c49d951b48a3a7f2710f9577cf346a361976e93def
-
Filesize
251B
MD5dc364dbeb88d1c30ba583f73093a5181
SHA13c19dfe65f4a9113b70b4c3838ab88f8f56a00d4
SHA2567de8fa231ae8006b320a88d6ea10ebe05076f348b38f7484538c3bce34b79bbc
SHA5123716b7b6fb4b9e20434a19a7b6a26e9b5aec6938d07f9e17d37e1f38d3a8e1014cbadc54e79c8705742e4bb25451711897433feac9ea6d5719fa406e665344e6
-
Filesize
121B
MD566616664345c504b501b5f199894e9cc
SHA1827b6229c0228d4517d62a44e4c21bd813a080a6
SHA256e5c67556d771f94bf2141036477a59e7eb79d804c5214616a3627c89a390aae2
SHA512dbeac9ab5c385b8455bfef2b2c739ee1d08a74941291a2de01a1d72eb2c151afc0ce1719b7d76ff4a65979d2d2397fe4342e12405672a0346be841cc27a91f68
-
Filesize
273KB
MD5fbea7120a8f72a98fa95a7a03a921dd2
SHA1c3ad1f59d85a251b08c99726b8e592da8d9f59dd
SHA256df62a51a0ef4f002238fe9d2a2dcd80af77f0f827e2424f7e943a96c6dff9088
SHA512e35de1e679666d9796a4a23be9ca7c63495866c492f1f7b9b3de34c9dfe870eaccc672436ba0d0af03a1ea84d674cd5170b4b2623e0add5f23945b060bbed98a
-
Filesize
273KB
MD5fbea7120a8f72a98fa95a7a03a921dd2
SHA1c3ad1f59d85a251b08c99726b8e592da8d9f59dd
SHA256df62a51a0ef4f002238fe9d2a2dcd80af77f0f827e2424f7e943a96c6dff9088
SHA512e35de1e679666d9796a4a23be9ca7c63495866c492f1f7b9b3de34c9dfe870eaccc672436ba0d0af03a1ea84d674cd5170b4b2623e0add5f23945b060bbed98a
-
Filesize
273KB
MD5fbea7120a8f72a98fa95a7a03a921dd2
SHA1c3ad1f59d85a251b08c99726b8e592da8d9f59dd
SHA256df62a51a0ef4f002238fe9d2a2dcd80af77f0f827e2424f7e943a96c6dff9088
SHA512e35de1e679666d9796a4a23be9ca7c63495866c492f1f7b9b3de34c9dfe870eaccc672436ba0d0af03a1ea84d674cd5170b4b2623e0add5f23945b060bbed98a