Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2022, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe
Resource
win10v2004-20221111-en
General
-
Target
859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe
-
Size
2.0MB
-
MD5
840b22c7f90815f6f2b1590c25dffe23
-
SHA1
51b1057d6a4d4369dfa4e2ea0b2b8dfce33d76c7
-
SHA256
859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c
-
SHA512
23a04f9bab64d190932e985da0bedfa7afacf9d822c9e5eaa18e878679c429a8b694ba45414472816bafa19559669ba662a21f10669b8f4bb9caa5249ef28c2d
-
SSDEEP
49152:TlBfJXAEGWFa5LtZhrCzyqKLNRIZo0Y2ZHhi:TlBfKEharCzyTJ2o8ZHM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe -
Loads dropped DLL 2 IoCs
pid Process 5068 rundll32.exe 212 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4328 4612 859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe 81 PID 4612 wrote to memory of 4328 4612 859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe 81 PID 4612 wrote to memory of 4328 4612 859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe 81 PID 4328 wrote to memory of 5068 4328 control.exe 83 PID 4328 wrote to memory of 5068 4328 control.exe 83 PID 4328 wrote to memory of 5068 4328 control.exe 83 PID 5068 wrote to memory of 3832 5068 rundll32.exe 90 PID 5068 wrote to memory of 3832 5068 rundll32.exe 90 PID 3832 wrote to memory of 212 3832 RunDll32.exe 91 PID 3832 wrote to memory of 212 3832 RunDll32.exe 91 PID 3832 wrote to memory of 212 3832 RunDll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe"C:\Users\Admin\AppData\Local\Temp\859ed7b613b977117ac2c40d05c1b30a2681376e7e7dd324407a9fea22de9d1c.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\wohWUQK.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\wohWUQK.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\wohWUQK.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\wohWUQK.cpl",5⤵
- Loads dropped DLL
PID:212
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5addca3dcfcce5cb1f2a3792f2bbabcda
SHA16caf945bbac15e357de322373be8936d6ed3414b
SHA2560275d2afdd6f03d0dca4a33dbffd0cc06516b877a001257018e6aeee47f56fd9
SHA512bd073e76fb552b48500857ad14ed9f8810126b13807cde23d00561fabd1a21803049b76364ff0e6ace7bcce981ae7f7489b320a2b95232eb268e3ef957bea317
-
Filesize
2.0MB
MD5addca3dcfcce5cb1f2a3792f2bbabcda
SHA16caf945bbac15e357de322373be8936d6ed3414b
SHA2560275d2afdd6f03d0dca4a33dbffd0cc06516b877a001257018e6aeee47f56fd9
SHA512bd073e76fb552b48500857ad14ed9f8810126b13807cde23d00561fabd1a21803049b76364ff0e6ace7bcce981ae7f7489b320a2b95232eb268e3ef957bea317
-
Filesize
2.0MB
MD5addca3dcfcce5cb1f2a3792f2bbabcda
SHA16caf945bbac15e357de322373be8936d6ed3414b
SHA2560275d2afdd6f03d0dca4a33dbffd0cc06516b877a001257018e6aeee47f56fd9
SHA512bd073e76fb552b48500857ad14ed9f8810126b13807cde23d00561fabd1a21803049b76364ff0e6ace7bcce981ae7f7489b320a2b95232eb268e3ef957bea317