Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe
Resource
win10v2004-20220812-en
General
-
Target
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe
-
Size
36KB
-
MD5
14482cc2f6ed4e97b98f8624170d3136
-
SHA1
4607b0f0b28e1dcd38257a5f79845573c67067b0
-
SHA256
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
-
SHA512
0b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f
-
SSDEEP
384:ZBl36dg/Bd8QVKKAINWoHhp2IC/YS4SehSWSXSW0SjS4SoSV9hDNJE:Hl36dgpd8iKnINJC/Yxnhd8I0X7Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2732 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3588 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 3028 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3496 3588 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 80 PID 3588 wrote to memory of 3496 3588 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 80 PID 3588 wrote to memory of 3496 3588 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 80 PID 3496 wrote to memory of 2732 3496 cmd.exe 82 PID 3496 wrote to memory of 2732 3496 cmd.exe 82 PID 3496 wrote to memory of 2732 3496 cmd.exe 82 PID 3496 wrote to memory of 3028 3496 cmd.exe 83 PID 3496 wrote to memory of 3028 3496 cmd.exe 83 PID 3496 wrote to memory of 3028 3496 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe"C:\Users\Admin\AppData\Local\Temp\c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Melt.bat" -s"2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\PING.EXEping ; 1.2; 0.3; 0.4 - n; 1 - w; 5003⤵
- Runs ping.exe
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exesvchost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5ffd4716da908eb2a2177e39c6e216984
SHA1b707da4f43cbc7cdfe8832658724a15b662c277b
SHA256c881b54e4262b07fc9220e9904d93e25ab96ee3768ed3c10b409ef1ac1fc6ddf
SHA512ce655c4ff8629b5b50dbb77fb187bff2a7d6ad8d1a355722411d4f5e35eac8f4be476d21059e621b0dd0591de43a8cc06da70e0b898fe3f3446ac1b525022bb0
-
Filesize
36KB
MD514482cc2f6ed4e97b98f8624170d3136
SHA14607b0f0b28e1dcd38257a5f79845573c67067b0
SHA256c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
SHA5120b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f
-
Filesize
36KB
MD514482cc2f6ed4e97b98f8624170d3136
SHA14607b0f0b28e1dcd38257a5f79845573c67067b0
SHA256c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
SHA5120b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f