Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    210s
  • max time network
    215s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 22:09

General

  • Target

    db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe

  • Size

    168KB

  • MD5

    27c25ef387fcc1f5494a293f8c05c139

  • SHA1

    7ed5514f5be509eb098f11551c0d75415e7922af

  • SHA256

    db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007

  • SHA512

    55e64a5d8c224bc293ec8712c0e4ff472cb830b8e77f1b44ea2d5c69ee261f352ab9453836977e7f80567bd0b70a067e183b6c91038496274d1ed5d51ed5fc3f

  • SSDEEP

    1536:IV7y3/PPqPwyzTGRfu+1niPRI7gIeTo88zQMihZOy+RMnmE7UkAFJZvhICqDojIv:kkPqPVzTGRfu67bNz2hT9nmEzHv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe
    "C:\Users\Admin\AppData\Local\Temp\db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\heeihox.exe
      "C:\Users\Admin\heeihox.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\heeihox.exe

    Filesize

    168KB

    MD5

    916bcbdee82370685200281fb50e03a7

    SHA1

    1117b46dff0f8f4cb62b7a52ba52df63e629e834

    SHA256

    94d1ee28a9572b644dce0b8873d18093e33eb666ab112b799b43bdf7d8d1bcca

    SHA512

    d8f055694abaf45f435460621c6c1ac3c50142cb65fdcc0cf2512fa3e308e615307164dc570fee986ac90644caebd4a240940287a8f31ded6d5e7e7e83c0d972

  • C:\Users\Admin\heeihox.exe

    Filesize

    168KB

    MD5

    916bcbdee82370685200281fb50e03a7

    SHA1

    1117b46dff0f8f4cb62b7a52ba52df63e629e834

    SHA256

    94d1ee28a9572b644dce0b8873d18093e33eb666ab112b799b43bdf7d8d1bcca

    SHA512

    d8f055694abaf45f435460621c6c1ac3c50142cb65fdcc0cf2512fa3e308e615307164dc570fee986ac90644caebd4a240940287a8f31ded6d5e7e7e83c0d972