Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
181s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe
Resource
win10v2004-20221111-en
General
-
Target
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe
-
Size
1.1MB
-
MD5
53f03e54600ad28c18c3baee560c4d6e
-
SHA1
4d1967c7bd413359175db965d3e098747253923f
-
SHA256
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3
-
SHA512
7f59ecb46927a7b60cf499990fff03bb54485f3f575cca2dd30a33bacb5c6f39ab10c65f9b57ed50b9cac3598bf6aa250b48a85783d5e95b3442f5308e5e8bc6
-
SSDEEP
12288:mJeJfEuGstUg/Tjp98zvpie5tojX0vBSVP+zBUWb9lx/9:mJeJfAqTjp98zvpieToL0BC29nPx/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe " a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe regsvr.exe" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Msn Messsenger = "C:\\Windows\\system32\\regsvr.exe" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3324-132-0x0000000000400000-0x00000000004DB000-memory.dmp autoit_exe behavioral2/memory/3324-137-0x0000000000400000-0x00000000004DB000-memory.dmp autoit_exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchost .exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\SysWOW64\svchost .exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\SysWOW64\setup.ini a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\SysWOW64\28463 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File created C:\Windows\SysWOW64\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File created C:\Windows\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3324 wrote to memory of 1896 3324 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 82 PID 3324 wrote to memory of 1896 3324 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 82 PID 3324 wrote to memory of 1896 3324 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 82 PID 1896 wrote to memory of 1680 1896 cmd.exe 84 PID 1896 wrote to memory of 1680 1896 cmd.exe 84 PID 1896 wrote to memory of 1680 1896 cmd.exe 84 PID 3324 wrote to memory of 4284 3324 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 85 PID 3324 wrote to memory of 4284 3324 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 85 PID 3324 wrote to memory of 4284 3324 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 85 PID 4284 wrote to memory of 3188 4284 cmd.exe 87 PID 4284 wrote to memory of 3188 4284 cmd.exe 87 PID 4284 wrote to memory of 3188 4284 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe"C:\Users\Admin\AppData\Local\Temp\a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe3⤵PID:3188
-
-