Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe
Resource
win10v2004-20221111-en
General
-
Target
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe
-
Size
92KB
-
MD5
d86e720a88533e62cadd418b2f2f7599
-
SHA1
4d4f7b9635ce2554e8bf9f57f970061a1f219191
-
SHA256
81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
-
SHA512
7a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887
-
SSDEEP
1536:/giuHKiksDOIeAMGXGyoI9y+kpFm94msrP9UnCcyUngZuc163Xqqi9T:YnKtsDOpAMGXGyoI9kpFm94msrP9UCc8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SystemService = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gbot\\svchost.exe" REG.exe -
Executes dropped EXE 1 IoCs
pid Process 228 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4232 REG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1784 wrote to memory of 228 1784 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 83 PID 1784 wrote to memory of 228 1784 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 83 PID 1784 wrote to memory of 228 1784 81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe 83 PID 228 wrote to memory of 4232 228 svchost.exe 84 PID 228 wrote to memory of 4232 228 svchost.exe 84 PID 228 wrote to memory of 4232 228 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe"C:\Users\Admin\AppData\Local\Temp\81f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe"C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\REG.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run /V "SystemService" /D "C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe" /F3⤵
- Adds policy Run key to start application
- Modifies registry key
PID:4232
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d86e720a88533e62cadd418b2f2f7599
SHA14d4f7b9635ce2554e8bf9f57f970061a1f219191
SHA25681f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
SHA5127a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887
-
Filesize
92KB
MD5d86e720a88533e62cadd418b2f2f7599
SHA14d4f7b9635ce2554e8bf9f57f970061a1f219191
SHA25681f7f65f317116b17f1b06091cf959bd415a95123925c50e58fc0c576e94d8a0
SHA5127a946ede59812f1f4dd3e460f81b2c610c27fafee12443586f4bd49e041e073a8c99da09da38362f6546fe3818f29c1d3f50c938754f0e9d21c55b17e2166887