Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2022, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe
Resource
win10v2004-20221111-en
General
-
Target
28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe
-
Size
1.6MB
-
MD5
6b3030ad5bc688a9a59364df9a89fb5c
-
SHA1
ef5d3966b96eb2683ea51ecc7e6a02df97bf81db
-
SHA256
28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16
-
SHA512
37c85078fd6934936b18a8a772bb92b49ef780ee7f03835afcf33decba7372977e03b2390f27f516f2e298f3115edd6a8395e8cc6308c3bd4f9ee4d59bbf2055
-
SSDEEP
24576:5HLmCiIhiXl9XpzvQqHcJJSpvCTxja8UEZero+AbIYU/XPEuCXYwABdcM35a79cK:qvXpF8fivWZe6cjvPE98dt3c790Jw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe -
Loads dropped DLL 1 IoCs
pid Process 2560 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2560 3448 28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe 80 PID 3448 wrote to memory of 2560 3448 28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe 80 PID 3448 wrote to memory of 2560 3448 28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe"C:\Users\Admin\AppData\Local\Temp\28d7b6b6276c62ea27e0bec08d9c097c26c14a960d08318daac0a156cf6a8f16.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -u /S 99SLGJF9.uI2⤵
- Loads dropped DLL
PID:2560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52752909157ac082228a0dc5e5c915615
SHA15ba0b3aa11951912d2eaab7c411c9fc999e45768
SHA256270ac65723270f021dbe842fe3747019e56e62214a953b6a030ecaae13f39be3
SHA512191b39b5ee89d4170745e670b12fb9ca6aef884a182d150fa50896978d3210136eebd77a0497cc52a20659f33b205a1aa977248d776bf2fb7dc9332ec57f447b
-
Filesize
1.2MB
MD52752909157ac082228a0dc5e5c915615
SHA15ba0b3aa11951912d2eaab7c411c9fc999e45768
SHA256270ac65723270f021dbe842fe3747019e56e62214a953b6a030ecaae13f39be3
SHA512191b39b5ee89d4170745e670b12fb9ca6aef884a182d150fa50896978d3210136eebd77a0497cc52a20659f33b205a1aa977248d776bf2fb7dc9332ec57f447b