Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
415KB
-
MD5
4e12f53b36ae58a9e181cd3bc660e750
-
SHA1
d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
-
SHA256
c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
-
SHA512
3932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
SSDEEP
6144:/mjIyZwfLm4RP6BLMZhJrAHo496ZC4qVatxX4WcoBlCwh/yaV:/mjBZWi4RCBQ8oFQ3VatxrcWCsq
Malware Config
Extracted
amadey
3.50
77.73.133.72/hfk3vK9/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 5056 gntuud.exe 1732 gntuud.exe 4396 gntuud.exe 4024 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 4920 4656 WerFault.exe 79 4812 1732 WerFault.exe 86 4464 4396 WerFault.exe 91 4496 4024 WerFault.exe 100 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1388 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4656 wrote to memory of 5056 4656 file.exe 80 PID 4656 wrote to memory of 5056 4656 file.exe 80 PID 4656 wrote to memory of 5056 4656 file.exe 80 PID 5056 wrote to memory of 1388 5056 gntuud.exe 84 PID 5056 wrote to memory of 1388 5056 gntuud.exe 84 PID 5056 wrote to memory of 1388 5056 gntuud.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 9042⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4656 -ip 46561⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe1⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 4162⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1732 -ip 17321⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe1⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 4242⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4396 -ip 43961⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe1⤵
- Executes dropped EXE
PID:4024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 4242⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4024 -ip 40241⤵PID:2404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16