Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe
Resource
win10v2004-20220901-en
General
-
Target
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe
-
Size
1.5MB
-
MD5
787b9c8d7cb27e9e8760de7952db9457
-
SHA1
dce41739eece4589a298557c8ad76666e2a55a3e
-
SHA256
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d
-
SHA512
abcb853ac681d3fc139e7458da5b99055922eb2d84a5de6416b04aa3dd8375e38164fdd924b7fe0c5e0af04edef800f710ad241b7e83473316d6d2df7af0c741
-
SSDEEP
49152:3e7/I4a3ULKENZXQrqrpW5YvVgNv4Tov2PQ9eOwJG:K/ja3UuKerQp9NM4TKTwc
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4492 2546.exe 4452 5894.exe 748 5894.exe -
resource yara_rule behavioral2/files/0x0001000000022e19-136.dat upx behavioral2/files/0x0001000000022e19-137.dat upx behavioral2/memory/4452-138-0x0000000000400000-0x00000000004F8000-memory.dmp upx behavioral2/files/0x0001000000022e19-145.dat upx behavioral2/memory/4452-147-0x0000000000400000-0x00000000004F8000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 748 5894.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4452 set thread context of 748 4452 5894.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3112 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3112 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 748 5894.exe 748 5894.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3916 wrote to memory of 4492 3916 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 82 PID 3916 wrote to memory of 4492 3916 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 82 PID 3916 wrote to memory of 4492 3916 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 82 PID 3916 wrote to memory of 4452 3916 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 83 PID 3916 wrote to memory of 4452 3916 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 83 PID 3916 wrote to memory of 4452 3916 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 83 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84 PID 4452 wrote to memory of 748 4452 5894.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe"C:\Users\Admin\AppData\Local\Temp\8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\2546.exeC:\Users\Admin\AppData\Local\Temp\2546.exe2⤵
- Executes dropped EXE
PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\5894.exeC:\Users\Admin\AppData\Local\Temp\5894.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\5894.exeC:\Users\Admin\AppData\Local\Temp\5894.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:748
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822