Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe
Resource
win10v2004-20220812-en
General
-
Target
f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe
-
Size
31KB
-
MD5
8d034cc389be6fb5d245e6b51f433924
-
SHA1
d20f6c08fa3132ad924dcf911cb5262129e2a995
-
SHA256
f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878
-
SHA512
8f3c7b0d0b7fc9f3e2ef1bef6d1734c768d14131f7b35be7ea10d835f6886adbaad5771a8a25e0532781b39c3de51edbede6fe607357496f5fad1b7035e6f5e6
-
SSDEEP
768:6Kzy3t49hU9zy5HILSvnxJAMgHSPtmg8E/WSwVy:6IyuU9zy5IL6ugyB
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\64to32\Parameters\ServiceDll = "C:\\Windows\\system32\\64to32.dll" f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe -
Loads dropped DLL 1 IoCs
pid Process 5088 svchost.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.220.220 Destination IP 208.67.220.220 -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 svchost.exe File opened for modification C:\Windows\SysWOW64\Windowsxp.ini svchost.exe File created C:\Windows\SysWOW64\64to32.dll f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe File opened for modification C:\Windows\SysWOW64\Windowsxp32.ini svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4688 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 80 PID 2160 wrote to memory of 4688 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 80 PID 2160 wrote to memory of 4688 2160 f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe"C:\Users\Admin\AppData\Local\Temp\f1da1ee273abd9eec295f5792df13075a10a36fe97391446ff1ac28f9cd2e878.exe"1⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\F1DA1E~1.EXE >> NUL2⤵PID:4688
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD58f6fde7821d6d2908041d6dddabf8423
SHA1591f62ab4632609a5a7a208def9480daff497079
SHA2563f85c8788dd2b4e2b20c7bd617c4c9cf92d65ce9c8152874ed6f994b9ac4929a
SHA512470aa8d3b2302f2b5dc8a5400d080d233d3da81499f3bae5aa603cd3669317240cbb46844149545c5dd4f5569085fc5ca4d065197c3995451dd542313ce5a546
-
Filesize
68KB
MD58f6fde7821d6d2908041d6dddabf8423
SHA1591f62ab4632609a5a7a208def9480daff497079
SHA2563f85c8788dd2b4e2b20c7bd617c4c9cf92d65ce9c8152874ed6f994b9ac4929a
SHA512470aa8d3b2302f2b5dc8a5400d080d233d3da81499f3bae5aa603cd3669317240cbb46844149545c5dd4f5569085fc5ca4d065197c3995451dd542313ce5a546