Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe
Resource
win10v2004-20221111-en
General
-
Target
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe
-
Size
4.0MB
-
MD5
a8341dcc887476e5bcaf18994b73db3f
-
SHA1
10b4f9765b3dce8ac29725c80ff40287a4fcd256
-
SHA256
e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b
-
SHA512
e053996e562cf8da95ec3eb54354d16b1fb4e0af71161875c1e48fcf40a0a5f92b9b4f14d9426c6ad103f9433595e6e5d65369f4614527203babd5c1fa25c1a8
-
SSDEEP
49152:367KrK1i9AT7+/Nb+TnHOOsqzTRZt6GGNk1trAQ46jQYI3tNkXQGOPPJxP6wVFyV:xArskLpZMhlL2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 4280 2748 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4280 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4280 2748 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 86 PID 2748 wrote to memory of 4280 2748 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 86 PID 2748 wrote to memory of 4280 2748 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 86 PID 2748 wrote to memory of 4280 2748 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 86 PID 2748 wrote to memory of 4280 2748 e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"C:\Users\Admin\AppData\Local\Temp\e4deb3be8ef5a3b8ca51b14f18611800ffa4844fbff72b2867a6f02b641a5d5b.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4280
-