Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe
Resource
win10v2004-20221111-en
General
-
Target
800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe
-
Size
1.7MB
-
MD5
35fb581334755e485b13f45dc92ae4ce
-
SHA1
f81aa7bcc8acf31a804674b76e1f8912a97387a0
-
SHA256
800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca
-
SHA512
fe8bb2544565dd36a72618a9ca7d4fb87370cf367ee33f144e20b6f6f260045006ff69b19ce48cc38b13384faf5674028141127704b56b056d454de5fd0f19a4
-
SSDEEP
49152:084cUpwjQ/RayucA9OmcSm/n61XiS6rB9Lg3Ry8HzZ:6c6RVCvc71n03/d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe -
Loads dropped DLL 3 IoCs
pid Process 2752 rundll32.exe 2752 rundll32.exe 1268 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4924 wrote to memory of 1684 4924 800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe 82 PID 4924 wrote to memory of 1684 4924 800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe 82 PID 4924 wrote to memory of 1684 4924 800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe 82 PID 1684 wrote to memory of 2752 1684 control.exe 84 PID 1684 wrote to memory of 2752 1684 control.exe 84 PID 1684 wrote to memory of 2752 1684 control.exe 84 PID 2752 wrote to memory of 3108 2752 rundll32.exe 85 PID 2752 wrote to memory of 3108 2752 rundll32.exe 85 PID 3108 wrote to memory of 1268 3108 RunDll32.exe 86 PID 3108 wrote to memory of 1268 3108 RunDll32.exe 86 PID 3108 wrote to memory of 1268 3108 RunDll32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe"C:\Users\Admin\AppData\Local\Temp\800f3a19e6eb0521ff482ff309a8cb5e2336cf162d10ac3cc5497c1ce48e60ca.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\JHRVK.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JHRVK.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JHRVK.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\JHRVK.cpl",5⤵
- Loads dropped DLL
PID:1268
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5ad42fe3b275b851bce0ef13e7deafff3
SHA1afda56d362a3e3e865950843d76e5ad5db442e88
SHA25659c0b41a3ad0867879a8c33b1978b1036b587fc279f7ce23251f344c5150534c
SHA51293b2af874e013f6b2d4887777fd6079d82bb4b7633842d9cc885ed874a741082a6a4c3014b2d336ef31276dd11da2e7371f656714c683b8085ef89add65aa4ed
-
Filesize
2.0MB
MD5ad42fe3b275b851bce0ef13e7deafff3
SHA1afda56d362a3e3e865950843d76e5ad5db442e88
SHA25659c0b41a3ad0867879a8c33b1978b1036b587fc279f7ce23251f344c5150534c
SHA51293b2af874e013f6b2d4887777fd6079d82bb4b7633842d9cc885ed874a741082a6a4c3014b2d336ef31276dd11da2e7371f656714c683b8085ef89add65aa4ed
-
Filesize
2.0MB
MD5ad42fe3b275b851bce0ef13e7deafff3
SHA1afda56d362a3e3e865950843d76e5ad5db442e88
SHA25659c0b41a3ad0867879a8c33b1978b1036b587fc279f7ce23251f344c5150534c
SHA51293b2af874e013f6b2d4887777fd6079d82bb4b7633842d9cc885ed874a741082a6a4c3014b2d336ef31276dd11da2e7371f656714c683b8085ef89add65aa4ed
-
Filesize
2.0MB
MD5ad42fe3b275b851bce0ef13e7deafff3
SHA1afda56d362a3e3e865950843d76e5ad5db442e88
SHA25659c0b41a3ad0867879a8c33b1978b1036b587fc279f7ce23251f344c5150534c
SHA51293b2af874e013f6b2d4887777fd6079d82bb4b7633842d9cc885ed874a741082a6a4c3014b2d336ef31276dd11da2e7371f656714c683b8085ef89add65aa4ed