Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 02:52

General

  • Target

    03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe

  • Size

    96KB

  • MD5

    b9248e7d937265db39e7f415612ac184

  • SHA1

    6a4479d6416c340d77db5f803e5f03f02af953bd

  • SHA256

    03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6

  • SHA512

    203e96c020dd95ffa369324ffaa15d4e0785ec024e6741b9dc0fc13e596fa08282bb8cda26250ed21d8d558ea2527a674eff0fdb4f204d5f5ef82f5c68bf4601

  • SSDEEP

    1536:33hBHbf6cOahhkGulSc16l6u+NMMl/KlYv1T4hThFgNIjnZan:fhhGlu88FFgCn8n

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe
    "C:\Users\Admin\AppData\Local\Temp\03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\paoerus.exe
      "C:\Users\Admin\paoerus.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\paoerus.exe

    Filesize

    96KB

    MD5

    6acbc1957a050c309dc7ac51c6bb7adc

    SHA1

    c439aaf2a754d32f8496a5057cbf8c4966b71fab

    SHA256

    89b987f5be562dfc84a323fb6d379bbf421ddd2ff0f87682d18c9393dace6ec3

    SHA512

    5c7af910269d7399f6d33c4bbfb1e4b7dc1f47688893755959c83ecf050d1f59ad55f1b8d8d912bf071c823aa8273ed4c8db3956793541bccb80c1ce90043937

  • C:\Users\Admin\paoerus.exe

    Filesize

    96KB

    MD5

    6acbc1957a050c309dc7ac51c6bb7adc

    SHA1

    c439aaf2a754d32f8496a5057cbf8c4966b71fab

    SHA256

    89b987f5be562dfc84a323fb6d379bbf421ddd2ff0f87682d18c9393dace6ec3

    SHA512

    5c7af910269d7399f6d33c4bbfb1e4b7dc1f47688893755959c83ecf050d1f59ad55f1b8d8d912bf071c823aa8273ed4c8db3956793541bccb80c1ce90043937