Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    161s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 02:27

General

  • Target

    2a6344b7f08a540282425a5eda9d372b2e3e3d29b2585927f5cd15165bddb942.exe

  • Size

    1.1MB

  • MD5

    2cf63f5a820ae17c9fe2e087675c3512

  • SHA1

    6e94fbdc85a3e18610039f7533a8c5eace0febec

  • SHA256

    2a6344b7f08a540282425a5eda9d372b2e3e3d29b2585927f5cd15165bddb942

  • SHA512

    c607a835999f9b5cf010e95b131bf2729463a0e5a1d53b3fa86007ecde99ac3e403c2770056c07af25de81f4cfd75628ba042a1585620feb5feab9187c0740d8

  • SSDEEP

    24576:gB49HG3aEWiOhNUayb4DmKmAJe7qWmiMLWYY+g/M0WIdae48U:gB4HG3vChOHkDmKveWWmiZYYvjdab

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a6344b7f08a540282425a5eda9d372b2e3e3d29b2585927f5cd15165bddb942.exe
    "C:\Users\Admin\AppData\Local\Temp\2a6344b7f08a540282425a5eda9d372b2e3e3d29b2585927f5cd15165bddb942.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp",Qiysidaatietut
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Checks processor information in registry
      PID:212
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 540
      2⤵
      • Program crash
      PID:1504
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1964 -ip 1964
    1⤵
      PID:380

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp

      Filesize

      768KB

      MD5

      96655ec3277ef2e9ea4b5723f60f5b04

      SHA1

      b29e9005cedc5e0d63981e59b05a12f006bd8640

      SHA256

      36cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d

      SHA512

      cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c

    • C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp

      Filesize

      768KB

      MD5

      96655ec3277ef2e9ea4b5723f60f5b04

      SHA1

      b29e9005cedc5e0d63981e59b05a12f006bd8640

      SHA256

      36cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d

      SHA512

      cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c

    • memory/212-141-0x0000000005540000-0x00000000060A2000-memory.dmp

      Filesize

      11.4MB

    • memory/212-142-0x0000000005540000-0x00000000060A2000-memory.dmp

      Filesize

      11.4MB

    • memory/212-143-0x0000000004EE0000-0x0000000005020000-memory.dmp

      Filesize

      1.2MB

    • memory/212-144-0x0000000004EE0000-0x0000000005020000-memory.dmp

      Filesize

      1.2MB

    • memory/212-145-0x0000000005540000-0x00000000060A2000-memory.dmp

      Filesize

      11.4MB

    • memory/1964-135-0x0000000000400000-0x0000000000531000-memory.dmp

      Filesize

      1.2MB

    • memory/1964-134-0x0000000000400000-0x0000000000531000-memory.dmp

      Filesize

      1.2MB

    • memory/1964-133-0x0000000002240000-0x0000000002360000-memory.dmp

      Filesize

      1.1MB

    • memory/1964-139-0x0000000002240000-0x0000000002360000-memory.dmp

      Filesize

      1.1MB

    • memory/1964-140-0x0000000000400000-0x0000000000531000-memory.dmp

      Filesize

      1.2MB

    • memory/1964-132-0x000000000213D000-0x000000000221C000-memory.dmp

      Filesize

      892KB