Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 11:37

General

  • Target

    a323e68aebc97eb27e51be1676503e14680f4220b86f91bcee50b0bcc92fc4b7.exe

  • Size

    238KB

  • MD5

    112e40ee5541af5ba7b81ed771bae027

  • SHA1

    beb32f617e9010c7dd55e5f7ee81ec68d6c96cda

  • SHA256

    a323e68aebc97eb27e51be1676503e14680f4220b86f91bcee50b0bcc92fc4b7

  • SHA512

    cfd6bb1336e786c3574054c2ee2f28a87f268b8800719e6eeab859f9b3ca3c8e9963d39795c7068c7dd45164c56a2d93887853afe795a932617a838af45c6d9a

  • SSDEEP

    6144:sXsD12Z8V0JtIb1RxS5CD/35e6mgLWUgkEmXlo7njMjqr:fLV0cb1Vj3U7UNNXlW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a323e68aebc97eb27e51be1676503e14680f4220b86f91bcee50b0bcc92fc4b7.exe
    "C:\Users\Admin\AppData\Local\Temp\a323e68aebc97eb27e51be1676503e14680f4220b86f91bcee50b0bcc92fc4b7.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Program Files (x86)\newsoft\csrss.exe
      "C:\Program Files (x86)\newsoft\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\newsoft\csrss.exe

    Filesize

    238KB

    MD5

    112e40ee5541af5ba7b81ed771bae027

    SHA1

    beb32f617e9010c7dd55e5f7ee81ec68d6c96cda

    SHA256

    a323e68aebc97eb27e51be1676503e14680f4220b86f91bcee50b0bcc92fc4b7

    SHA512

    cfd6bb1336e786c3574054c2ee2f28a87f268b8800719e6eeab859f9b3ca3c8e9963d39795c7068c7dd45164c56a2d93887853afe795a932617a838af45c6d9a

  • C:\Program Files (x86)\newsoft\csrss.exe

    Filesize

    238KB

    MD5

    112e40ee5541af5ba7b81ed771bae027

    SHA1

    beb32f617e9010c7dd55e5f7ee81ec68d6c96cda

    SHA256

    a323e68aebc97eb27e51be1676503e14680f4220b86f91bcee50b0bcc92fc4b7

    SHA512

    cfd6bb1336e786c3574054c2ee2f28a87f268b8800719e6eeab859f9b3ca3c8e9963d39795c7068c7dd45164c56a2d93887853afe795a932617a838af45c6d9a

  • memory/4544-137-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/4544-138-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/4692-132-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/4692-136-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB