Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159.exe
Resource
win7-20220812-en
General
-
Target
b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159.exe
-
Size
7.1MB
-
MD5
73f93de9122c1cb5ab2114a48ac89aa5
-
SHA1
7c7e89120c223757cd56444dd59038ce7d51cc1d
-
SHA256
b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159
-
SHA512
dd98dcc58f123b43bc3fd9ff08e1e721780de32f99ace9bacbe1cdd7d1fcd6ef0d271cd2c4fd6c3d23455a95d171af1cfa40c6946ebccb40a89fa56630106f52
-
SSDEEP
12288:eOdKn0MN4QLAgiEQRSWeFhYaUBm4tlTcVt1NAXo0ntZt7r457iY3ziFitiEj8mJM:uLt8sz8w8AneH9dkKEYju8z2Lx5v
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4488 MihJq.exe.exe 5108 dzyaI.exe.exe 4332 Atom Emulator.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation MihJq.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation dzyaI.exe.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1408 4332 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 4488 1716 b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159.exe 82 PID 1716 wrote to memory of 4488 1716 b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159.exe 82 PID 4488 wrote to memory of 5108 4488 MihJq.exe.exe 83 PID 4488 wrote to memory of 5108 4488 MihJq.exe.exe 83 PID 4488 wrote to memory of 5108 4488 MihJq.exe.exe 83 PID 5108 wrote to memory of 4332 5108 dzyaI.exe.exe 84 PID 5108 wrote to memory of 4332 5108 dzyaI.exe.exe 84 PID 5108 wrote to memory of 4332 5108 dzyaI.exe.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159.exe"C:\Users\Admin\AppData\Local\Temp\b63018530ae196c69a61d921d085fc2f99b1f5519ef71016722cc2cd3e083159.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MihJq.exe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MihJq.exe.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\dzyaI.exe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\dzyaI.exe.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Roaming\Atom Emulator.exe"C:\Users\Admin\AppData\Roaming\Atom Emulator.exe"4⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 8365⤵
- Program crash
PID:1408
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4332 -ip 43321⤵PID:1092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
637KB
MD5107bf383b07a008456b2d085b51df2c8
SHA1e1f1447d8950fead479107b3c2978d9bcec983f8
SHA25695b38d035612054ca7cd6ddececf23636ce245bf28175b20aff9203bff600c95
SHA5126acfca84a74e0daf756edea58383095cd8441e0eb7045a3dafac1369a7fe643729cc1138a12685b17a457715226817bc2aef4d4f496b01685dc79770e844c7cd
-
Filesize
637KB
MD5107bf383b07a008456b2d085b51df2c8
SHA1e1f1447d8950fead479107b3c2978d9bcec983f8
SHA25695b38d035612054ca7cd6ddececf23636ce245bf28175b20aff9203bff600c95
SHA5126acfca84a74e0daf756edea58383095cd8441e0eb7045a3dafac1369a7fe643729cc1138a12685b17a457715226817bc2aef4d4f496b01685dc79770e844c7cd
-
Filesize
2.6MB
MD5001292623404de06887a7013b6616003
SHA1f10585236c54c9cec593e9060760ef033c5115cb
SHA256438e247e83964178b593601115baa1097fddbee48d01c8e1baa918d67dd5542f
SHA5121b9bc2114a1201def741a7e0a0259d061c9bcb4f7b2c45811f30aeac2a9771ff5ae6b38a1de733aa83dc2fd7c0ba5ba6388dae6e2568892fbefe922e4deda8d9
-
Filesize
2.6MB
MD5001292623404de06887a7013b6616003
SHA1f10585236c54c9cec593e9060760ef033c5115cb
SHA256438e247e83964178b593601115baa1097fddbee48d01c8e1baa918d67dd5542f
SHA5121b9bc2114a1201def741a7e0a0259d061c9bcb4f7b2c45811f30aeac2a9771ff5ae6b38a1de733aa83dc2fd7c0ba5ba6388dae6e2568892fbefe922e4deda8d9
-
Filesize
1000KB
MD5d528837382ba279d7defbeaaf35a46d5
SHA11fcab0afd56c2219b90b3bc218001d60a7e37c7d
SHA256a05108f66d4b01a1f00448ff5e730e644cedf226a142d86fdf497234a18b0337
SHA512f3c575f48cc5c7eb6cc349e1a74bf6969ff51c31db48e55723e20d59587ad60fc4085fe8a66d50fa08b27c8f2f3dddf9b473c94eff30e86fd6fb23975efb881b
-
Filesize
1000KB
MD5d528837382ba279d7defbeaaf35a46d5
SHA11fcab0afd56c2219b90b3bc218001d60a7e37c7d
SHA256a05108f66d4b01a1f00448ff5e730e644cedf226a142d86fdf497234a18b0337
SHA512f3c575f48cc5c7eb6cc349e1a74bf6969ff51c31db48e55723e20d59587ad60fc4085fe8a66d50fa08b27c8f2f3dddf9b473c94eff30e86fd6fb23975efb881b