Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2022, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe
Resource
win10v2004-20221111-en
General
-
Target
04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe
-
Size
1.8MB
-
MD5
b4bc90628a3bc8ef0f48bf676245be9c
-
SHA1
7269a81ea9f23eae146cc992e90c46c8d9169013
-
SHA256
04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca
-
SHA512
9683f43393e124e5eb2df454e5fdcef0ec586828470362bdfecd57e78d665a59ea46857bfa8b06d6a4dd7ec8037d6c812f933a7cee6bb4aa1528860e721adc97
-
SSDEEP
49152:H6awbQ7l4cqFLBKNluOrZ54bkjh0NeiR0w:H6RQ45BKb1N5WGhKeiOw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe -
Loads dropped DLL 3 IoCs
pid Process 1148 rundll32.exe 4208 rundll32.exe 4208 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4736 wrote to memory of 400 4736 04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe 82 PID 4736 wrote to memory of 400 4736 04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe 82 PID 4736 wrote to memory of 400 4736 04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe 82 PID 400 wrote to memory of 1148 400 control.exe 84 PID 400 wrote to memory of 1148 400 control.exe 84 PID 400 wrote to memory of 1148 400 control.exe 84 PID 1148 wrote to memory of 2592 1148 rundll32.exe 91 PID 1148 wrote to memory of 2592 1148 rundll32.exe 91 PID 2592 wrote to memory of 4208 2592 RunDll32.exe 92 PID 2592 wrote to memory of 4208 2592 RunDll32.exe 92 PID 2592 wrote to memory of 4208 2592 RunDll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe"C:\Users\Admin\AppData\Local\Temp\04ccc7b18c003a56a02845e980e1c45dfee304b7e91fb16043ae4515bfbf91ca.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\YQxI.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\YQxI.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\YQxI.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\YQxI.CpL",5⤵
- Loads dropped DLL
PID:4208
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD50195861b9ea3b35d4d3d78df2ad2e1b0
SHA19b6f56f36f97395519f10415a2f1226685faa087
SHA256a1152ab89412ef067b1595e981b48a06bc08d14b130fc4e2fddb02128f190cf1
SHA5129862a2a5e0f442bb4f1a638009a42369f62b2171b460584d8bfb732ccc883f20d03e6b6b3a6afe17a46aea863e397273d06249a265d6a34cf2e52b93fd5fc7a4
-
Filesize
1.8MB
MD50195861b9ea3b35d4d3d78df2ad2e1b0
SHA19b6f56f36f97395519f10415a2f1226685faa087
SHA256a1152ab89412ef067b1595e981b48a06bc08d14b130fc4e2fddb02128f190cf1
SHA5129862a2a5e0f442bb4f1a638009a42369f62b2171b460584d8bfb732ccc883f20d03e6b6b3a6afe17a46aea863e397273d06249a265d6a34cf2e52b93fd5fc7a4
-
Filesize
1.8MB
MD50195861b9ea3b35d4d3d78df2ad2e1b0
SHA19b6f56f36f97395519f10415a2f1226685faa087
SHA256a1152ab89412ef067b1595e981b48a06bc08d14b130fc4e2fddb02128f190cf1
SHA5129862a2a5e0f442bb4f1a638009a42369f62b2171b460584d8bfb732ccc883f20d03e6b6b3a6afe17a46aea863e397273d06249a265d6a34cf2e52b93fd5fc7a4
-
Filesize
1.8MB
MD50195861b9ea3b35d4d3d78df2ad2e1b0
SHA19b6f56f36f97395519f10415a2f1226685faa087
SHA256a1152ab89412ef067b1595e981b48a06bc08d14b130fc4e2fddb02128f190cf1
SHA5129862a2a5e0f442bb4f1a638009a42369f62b2171b460584d8bfb732ccc883f20d03e6b6b3a6afe17a46aea863e397273d06249a265d6a34cf2e52b93fd5fc7a4