Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 13:25

General

  • Target

    6ceba8b4a61d487886028613f8722ca6aa10903883917f7192c65f2f912ccf83.exe

  • Size

    4.9MB

  • MD5

    3da9a1d1d629da63f5da4fe31dfb7055

  • SHA1

    2ae40a75d835993840c13de0e688fcbd3d960c8b

  • SHA256

    6ceba8b4a61d487886028613f8722ca6aa10903883917f7192c65f2f912ccf83

  • SHA512

    e16daeb9fb84f4dfcfbe18e18b860380b265933b73ef89234372e37847aa0b7f4d17c4c99597b32f97ad978feb2f60aa343b0fe0b63a2cde07e6c43ad5165525

  • SSDEEP

    98304:tKwUCaCzzYeP8owzOkaG0ns252TFIYgmRN2T/4E4RR+Ua+AxKDJf7SFmxS:owUCEePaFt2gSbZrU3kKdSF1

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:968
      • C:\Users\Admin\AppData\Local\Temp\6ceba8b4a61d487886028613f8722ca6aa10903883917f7192c65f2f912ccf83.exe
        "C:\Users\Admin\AppData\Local\Temp\6ceba8b4a61d487886028613f8722ca6aa10903883917f7192c65f2f912ccf83.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Program Files (x86)\SubwaySurfers\SubwaySurfers.exe
          "C:\Program Files (x86)\SubwaySurfers\SubwaySurfers.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1736
          • C:\Program Files (x86)\SubwaySurfers\SubwaySurfers.exe
            "C:\Program Files (x86)\SubwaySurfers\SubwaySurfers.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:3656
        • C:\Program Files (x86)\SubwaySurfers\runme.exe
          "C:\Program Files (x86)\SubwaySurfers\runme.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:2484
        • C:\Program Files (x86)\SubwaySurfers\4konya.exe
          "C:\Program Files (x86)\SubwaySurfers\4konya.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\So\Sa\yaveruchtoonadoidetdonasi.bat" "
            4⤵
            • Drops file in Drivers directory
            • Checks computer location settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4652
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\So\Sa\begom_na_zore.vbs"
              5⤵
              • Drops file in Drivers directory
              PID:1748
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\So\Sa\sasha_po_soshe.vbs"
              5⤵
                PID:3472
          • C:\Program Files (x86)\SubwaySurfers\mac.exe
            "C:\Program Files (x86)\SubwaySurfers\mac.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3904
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
              dw20.exe -x -s 1560
              4⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:3676
      • C:\PROGRA~3\Mozilla\znblaln.exe
        C:\PROGRA~3\Mozilla\znblaln.exe -irlyaih
        1⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 508
          2⤵
          • Program crash
          PID:4768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2124 -ip 2124
        1⤵
          PID:4384

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~3\Mozilla\znblaln.exe

          Filesize

          270KB

          MD5

          210d3d7b43250dbceb7855c4a709215d

          SHA1

          ddf920eaf33db06ba18c871b83821feec8313d27

          SHA256

          de22065a34de4856b91ab34631b399b412a3670ec159debf702d73c5b646f898

          SHA512

          6c6491e078ca9204216bab6dca745ae7c1b8f4fb77db3167101d532e00c380de8e9bff942b27e8949edbd01a310f2ffde59dfed6359ba5e14a3cc2033c63dda4

        • C:\Program Files (x86)\So\Sa\begom_na_zore.vbs

          Filesize

          1KB

          MD5

          2f9625ced427b3ca5951a254c8f1a1cd

          SHA1

          1ad9baa956aeba4b84a2aea3a8d2b0e2e3ea4de6

          SHA256

          02875049e62a5f01c911a83bbbb3d8d2a3cfe7a9771470d04c6050e66bba5c66

          SHA512

          2a9f7a673509945192b226f30b9d989da86229e6c39f6196ecb31e230d2a5ed3c2eb2ca5584d29921cf7e3b230a68010e1be1ef31591e042e35f28e903c5f295

        • C:\Program Files (x86)\So\Sa\nalei_tr.af

          Filesize

          27B

          MD5

          213c0742081a9007c9093a01760f9f8c

          SHA1

          df53bb518c732df777b5ce19fc7c02dcb2f9d81b

          SHA256

          9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

          SHA512

          55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

        • C:\Program Files (x86)\So\Sa\niznitor.cho

          Filesize

          44B

          MD5

          06b72f2e91ce7dfccc59c485c05450c5

          SHA1

          a56b511cf737b3785604c1af6323ee79665de58b

          SHA256

          6d4285fc44c978f678f815a7a0bdfff1b43a63b08fca4581061a246179af13ab

          SHA512

          4ff19d29c90f46d121793f942fa3f16b9485f5d5b32773f3faedb1d9e4d0662670699f7aaae6dc31cd7588d90c0b62295b0db24797e82dba39083456759b7c56

        • C:\Program Files (x86)\So\Sa\sasha_po_soshe.vbs

          Filesize

          162B

          MD5

          54aad904bc26d06756408c9c4b9d37d1

          SHA1

          e1825c33b4e1cb5ee488bee3cff8439a54bdec33

          SHA256

          0ea4b001b3d9ee588a31c7db6e1735e11510e91b14023100004540f6f6d4b38b

          SHA512

          c912e6793f6efdeafacb638f4a57240384195641659fe749747488b2fe939f018424da76b38f6fda1bdae5f43fa757d364e6f96594c6996d261f6f03ba219f8a

        • C:\Program Files (x86)\So\Sa\yaveruchtoonadoidetdonasi.bat

          Filesize

          1KB

          MD5

          c4ef4e633ed1144c3af0284c084c8ac8

          SHA1

          29a4017f2ba33dcc2b93158444c458f3710efaa5

          SHA256

          936d612af904777f98592cae37802bd2f741b530840d15d3b8aea7abb269d9a9

          SHA512

          8c52f55c7f851a52b684ca847bb2d9f67cb196b53eb110c415697772ff7e754611c4bd2ae67b7c415935ba0896549edc121694a7eeec8dfe6644948624fd1da4

        • C:\Program Files (x86)\SubwaySurfers\4konya.exe

          Filesize

          158KB

          MD5

          5938ee1ebc7ad3547352640411eeb861

          SHA1

          08a971987df20ca3dabca264d08e1ac4fb469744

          SHA256

          ccfe4b69052cf07478c074915333aad213adccef2bbebe9e9f1f9b46cb984fd8

          SHA512

          f03f93f4999e5ba644793f1c588e6d24eb1f730c3d667d49b533055506721dad9661c7320e46999bf2cc178795f5d2f1c77757a7672a24fa60a8c52d90b1d53b

        • C:\Program Files (x86)\SubwaySurfers\4konya.exe

          Filesize

          158KB

          MD5

          5938ee1ebc7ad3547352640411eeb861

          SHA1

          08a971987df20ca3dabca264d08e1ac4fb469744

          SHA256

          ccfe4b69052cf07478c074915333aad213adccef2bbebe9e9f1f9b46cb984fd8

          SHA512

          f03f93f4999e5ba644793f1c588e6d24eb1f730c3d667d49b533055506721dad9661c7320e46999bf2cc178795f5d2f1c77757a7672a24fa60a8c52d90b1d53b

        • C:\Program Files (x86)\SubwaySurfers\Interop.IWshRuntimeLibrary.dll

          Filesize

          48KB

          MD5

          d923d4b8d2eba5847c92b8fdd3a0378f

          SHA1

          e99c5b639918616d41e06f1274c6ec5b9706c706

          SHA256

          73de6d8cd7795bed2fe4dd894a3febfc0083b7916b9bedc77a61fa1d23deee84

          SHA512

          2fcc23f1fa829fada9e77814af8062a077871128eddc6233c8bf1673af1ee0475489d2c6b8585e1d4066f2acf0657e024ac7fa93659c0ca0fb68bf582ce068bf

        • C:\Program Files (x86)\SubwaySurfers\SubwaySurfers.exe

          Filesize

          4.1MB

          MD5

          f856be91f2a92ecbfcbb06f84874daa7

          SHA1

          89b1715a73e50b102d67e87ff3f1e4172a501d3a

          SHA256

          bdbbd6cfc90ad53087a62f344afe38ecee17423a19b00f75d6b3d9659fa2c039

          SHA512

          3d9a93989acc80d805bbf8649cd2236a55a6b19012aa3a905d9607bb623b82dcedffbca8f61328cbaae7f9d034245d6af77916e728f505725f3a03de0038cfbc

        • C:\Program Files (x86)\SubwaySurfers\SubwaySurfers.exe

          Filesize

          4.1MB

          MD5

          f856be91f2a92ecbfcbb06f84874daa7

          SHA1

          89b1715a73e50b102d67e87ff3f1e4172a501d3a

          SHA256

          bdbbd6cfc90ad53087a62f344afe38ecee17423a19b00f75d6b3d9659fa2c039

          SHA512

          3d9a93989acc80d805bbf8649cd2236a55a6b19012aa3a905d9607bb623b82dcedffbca8f61328cbaae7f9d034245d6af77916e728f505725f3a03de0038cfbc

        • C:\Program Files (x86)\SubwaySurfers\SubwaySurfers.exe

          Filesize

          4.1MB

          MD5

          f856be91f2a92ecbfcbb06f84874daa7

          SHA1

          89b1715a73e50b102d67e87ff3f1e4172a501d3a

          SHA256

          bdbbd6cfc90ad53087a62f344afe38ecee17423a19b00f75d6b3d9659fa2c039

          SHA512

          3d9a93989acc80d805bbf8649cd2236a55a6b19012aa3a905d9607bb623b82dcedffbca8f61328cbaae7f9d034245d6af77916e728f505725f3a03de0038cfbc

        • C:\Program Files (x86)\SubwaySurfers\mac.exe

          Filesize

          86KB

          MD5

          47af31afd8658aa7924283ce9f33ab0c

          SHA1

          bffc90a3ad32d6b085972a1401563bdafc97cd14

          SHA256

          041ee5479c2fd3df52c3ece70f6948eadb200aee7ad2cbaa7b25326383cddd95

          SHA512

          4b1b101bc3bbf14ce31f8d6620467e1d812fc220e46ac580c8c77fe71ba45f75876365f71bdbee871374a7c19c5e0160a376a55c9b428db6f61644d9c3e3a695

        • C:\Program Files (x86)\SubwaySurfers\mac.exe

          Filesize

          86KB

          MD5

          47af31afd8658aa7924283ce9f33ab0c

          SHA1

          bffc90a3ad32d6b085972a1401563bdafc97cd14

          SHA256

          041ee5479c2fd3df52c3ece70f6948eadb200aee7ad2cbaa7b25326383cddd95

          SHA512

          4b1b101bc3bbf14ce31f8d6620467e1d812fc220e46ac580c8c77fe71ba45f75876365f71bdbee871374a7c19c5e0160a376a55c9b428db6f61644d9c3e3a695

        • C:\Program Files (x86)\SubwaySurfers\runme.exe

          Filesize

          270KB

          MD5

          57bb3bbc05b6a5fb10522ba78237f66f

          SHA1

          69c0d913fabc98abfc5af4001f9866557639912f

          SHA256

          fd4f4195ed77807e33a9238b8155b6dc9d0dc40d564ccbee3c2e53c01a1bec67

          SHA512

          617980be47854649235fe53b4f67af55be65ab1aef75f0e280928eb94a5e39f06386b3a5ca19580e63792492b720dfc9731aa6984013d9e60bc158aa5871cf5d

        • C:\Program Files (x86)\SubwaySurfers\runme.exe

          Filesize

          270KB

          MD5

          57bb3bbc05b6a5fb10522ba78237f66f

          SHA1

          69c0d913fabc98abfc5af4001f9866557639912f

          SHA256

          fd4f4195ed77807e33a9238b8155b6dc9d0dc40d564ccbee3c2e53c01a1bec67

          SHA512

          617980be47854649235fe53b4f67af55be65ab1aef75f0e280928eb94a5e39f06386b3a5ca19580e63792492b720dfc9731aa6984013d9e60bc158aa5871cf5d

        • C:\ProgramData\Mozilla\znblaln.exe

          Filesize

          270KB

          MD5

          210d3d7b43250dbceb7855c4a709215d

          SHA1

          ddf920eaf33db06ba18c871b83821feec8313d27

          SHA256

          de22065a34de4856b91ab34631b399b412a3670ec159debf702d73c5b646f898

          SHA512

          6c6491e078ca9204216bab6dca745ae7c1b8f4fb77db3167101d532e00c380de8e9bff942b27e8949edbd01a310f2ffde59dfed6359ba5e14a3cc2033c63dda4

        • C:\Users\Admin\AppData\Local\Temp\{FC3ED967-3CC9-44B0-977A-D1F1A5A12BD8}.dll

          Filesize

          120KB

          MD5

          c9f333d1ff898672a34805f94a265329

          SHA1

          2deaac66698fb2e9b3868d23034c3211c508b739

          SHA256

          07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

          SHA512

          048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

        • C:\Users\Admin\AppData\Local\Temp\{FC3ED967-3CC9-44B0-977A-D1F1A5A12BD8}.dll

          Filesize

          120KB

          MD5

          c9f333d1ff898672a34805f94a265329

          SHA1

          2deaac66698fb2e9b3868d23034c3211c508b739

          SHA256

          07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

          SHA512

          048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          1KB

          MD5

          fc9cc9adef1783041f958397016a7646

          SHA1

          4764664e116953ad83d3a8873cd95c28aef7860a

          SHA256

          526ab221525681d39e0073513e17cdeb2cca4e27ad2a91053e52ca3d99ef05ae

          SHA512

          e8671370d2bb83b1c0708b4a70dc010997b300ff6cbdd58ae8eda6bf4cbef984d3070b40916bb5e4f2cade584439debf250c8d0a30eaf76198996ee8f84889e1

        • memory/968-175-0x0000000008710000-0x000000000872C000-memory.dmp

          Filesize

          112KB

        • memory/2124-169-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2124-164-0x0000000001FD0000-0x000000000202F000-memory.dmp

          Filesize

          380KB

        • memory/2124-177-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2124-176-0x0000000001FD0000-0x000000000202F000-memory.dmp

          Filesize

          380KB

        • memory/2484-149-0x0000000000600000-0x000000000065F000-memory.dmp

          Filesize

          380KB

        • memory/2484-156-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2484-150-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2484-158-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/3656-174-0x0000000006570000-0x00000000065CB000-memory.dmp

          Filesize

          364KB

        • memory/3656-141-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/3656-151-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/3656-139-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/3656-157-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/3656-143-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/3656-155-0x0000000006570000-0x00000000065CB000-memory.dmp

          Filesize

          364KB

        • memory/3904-159-0x00007FFE98280000-0x00007FFE98CB6000-memory.dmp

          Filesize

          10.2MB