Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2022, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe
Resource
win10v2004-20221111-en
General
-
Target
be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe
-
Size
1.7MB
-
MD5
03eb9c039a552a1a82113ce0b178f953
-
SHA1
b00c2eaf1bda51c626938660d8d25f22d8b97e20
-
SHA256
be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02
-
SHA512
ded438a18c91bd8e9c5bb03d0c9fd20e382f6bf6953133bf2b6bcd152f84d459a207ca7e006c8df8ea69bfb43fc52581d584daf8933d2745f43d0724ed4c3f99
-
SSDEEP
49152:4u4mdb3CbUb2xXy7ZGchtYKSMVjjl23gVjf8:4u4+32UbmXyGLKSMV834f8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe -
Loads dropped DLL 4 IoCs
pid Process 3148 rundll32.exe 3148 rundll32.exe 1268 rundll32.exe 1268 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3064 2732 be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe 85 PID 2732 wrote to memory of 3064 2732 be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe 85 PID 2732 wrote to memory of 3064 2732 be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe 85 PID 3064 wrote to memory of 3148 3064 control.exe 87 PID 3064 wrote to memory of 3148 3064 control.exe 87 PID 3064 wrote to memory of 3148 3064 control.exe 87 PID 3148 wrote to memory of 4100 3148 rundll32.exe 92 PID 3148 wrote to memory of 4100 3148 rundll32.exe 92 PID 4100 wrote to memory of 1268 4100 RunDll32.exe 93 PID 4100 wrote to memory of 1268 4100 RunDll32.exe 93 PID 4100 wrote to memory of 1268 4100 RunDll32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe"C:\Users\Admin\AppData\Local\Temp\be734a507f65ef9069ca4ae605f7cdfcf849efbc3e6c5819d220a263ff20fd02.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\XNK7Y3.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\XNK7Y3.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\XNK7Y3.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\XNK7Y3.cpl",5⤵
- Loads dropped DLL
PID:1268
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58138b75f9a226b56b978aa63b94a060f
SHA1c710710de74d434688cf8df941d2f34cea05c478
SHA2560b6a7d9875c184e265876baddad63c6770ff8cff6e3c6753d678ad8375fc2548
SHA512d995eedd8281bf8dc9132ceb84a4182e97a94eb969f898ceeb4fc9aa7b1bac631880849cb0949c08543af45ef635d058e82d4366be00356b9f33a75c234bbeb8
-
Filesize
1.2MB
MD58138b75f9a226b56b978aa63b94a060f
SHA1c710710de74d434688cf8df941d2f34cea05c478
SHA2560b6a7d9875c184e265876baddad63c6770ff8cff6e3c6753d678ad8375fc2548
SHA512d995eedd8281bf8dc9132ceb84a4182e97a94eb969f898ceeb4fc9aa7b1bac631880849cb0949c08543af45ef635d058e82d4366be00356b9f33a75c234bbeb8
-
Filesize
1.2MB
MD58138b75f9a226b56b978aa63b94a060f
SHA1c710710de74d434688cf8df941d2f34cea05c478
SHA2560b6a7d9875c184e265876baddad63c6770ff8cff6e3c6753d678ad8375fc2548
SHA512d995eedd8281bf8dc9132ceb84a4182e97a94eb969f898ceeb4fc9aa7b1bac631880849cb0949c08543af45ef635d058e82d4366be00356b9f33a75c234bbeb8
-
Filesize
1.2MB
MD58138b75f9a226b56b978aa63b94a060f
SHA1c710710de74d434688cf8df941d2f34cea05c478
SHA2560b6a7d9875c184e265876baddad63c6770ff8cff6e3c6753d678ad8375fc2548
SHA512d995eedd8281bf8dc9132ceb84a4182e97a94eb969f898ceeb4fc9aa7b1bac631880849cb0949c08543af45ef635d058e82d4366be00356b9f33a75c234bbeb8
-
Filesize
1.2MB
MD58138b75f9a226b56b978aa63b94a060f
SHA1c710710de74d434688cf8df941d2f34cea05c478
SHA2560b6a7d9875c184e265876baddad63c6770ff8cff6e3c6753d678ad8375fc2548
SHA512d995eedd8281bf8dc9132ceb84a4182e97a94eb969f898ceeb4fc9aa7b1bac631880849cb0949c08543af45ef635d058e82d4366be00356b9f33a75c234bbeb8