Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2022, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe
Resource
win10v2004-20221111-en
General
-
Target
6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe
-
Size
1.6MB
-
MD5
8d9c93d81f7496cdcfd517e8e4e1a6a0
-
SHA1
2d203d74f83b2c41a0bd2ea9a9a36f96feb04226
-
SHA256
6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb
-
SHA512
d9ef89c742d21d0e9dee711a3f841dd0a1e3588f71ef6d5d6c5239769644274db96072db813d25a576b6cfb0292d9dfc73cabe90dbeb451a1e838572d7a6a7d3
-
SSDEEP
49152:KyRmWpGGmTgl1cPdbFam0nDcQnpetjVu8aC1MEsVH:KyRmSmTN1qfedViBl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 rundll32.exe 4204 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings 6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1124 4272 6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe 80 PID 4272 wrote to memory of 1124 4272 6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe 80 PID 4272 wrote to memory of 1124 4272 6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe 80 PID 1124 wrote to memory of 1600 1124 control.exe 82 PID 1124 wrote to memory of 1600 1124 control.exe 82 PID 1124 wrote to memory of 1600 1124 control.exe 82 PID 1600 wrote to memory of 2156 1600 rundll32.exe 89 PID 1600 wrote to memory of 2156 1600 rundll32.exe 89 PID 2156 wrote to memory of 4204 2156 RunDll32.exe 90 PID 2156 wrote to memory of 4204 2156 RunDll32.exe 90 PID 2156 wrote to memory of 4204 2156 RunDll32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe"C:\Users\Admin\AppData\Local\Temp\6ab27b05a64e477c66cc0addd933a9977d87dd00fc6675ecd1be5b9c3aeabedb.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\x356VW.Cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\x356VW.Cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\x356VW.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\x356VW.Cpl",5⤵
- Loads dropped DLL
PID:4204
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD564d5773c5ec8446daf67e8789b623dbf
SHA10cf6682241de68d40e54efe009bc847fc56730a7
SHA256d02e842d597ab8e89b107916ddc68e2d12a8dc1938bae3af80ce6251989d713b
SHA512189dbb43de17a2749c824a75372a1a8ea043d7f75ae5bbd5c78f8748e69c6dfa6cccadb92cc99d9ac0a4b66adb339c805770cea2dbe694586a2c757e9ed307a6
-
Filesize
1.6MB
MD564d5773c5ec8446daf67e8789b623dbf
SHA10cf6682241de68d40e54efe009bc847fc56730a7
SHA256d02e842d597ab8e89b107916ddc68e2d12a8dc1938bae3af80ce6251989d713b
SHA512189dbb43de17a2749c824a75372a1a8ea043d7f75ae5bbd5c78f8748e69c6dfa6cccadb92cc99d9ac0a4b66adb339c805770cea2dbe694586a2c757e9ed307a6
-
Filesize
1.6MB
MD564d5773c5ec8446daf67e8789b623dbf
SHA10cf6682241de68d40e54efe009bc847fc56730a7
SHA256d02e842d597ab8e89b107916ddc68e2d12a8dc1938bae3af80ce6251989d713b
SHA512189dbb43de17a2749c824a75372a1a8ea043d7f75ae5bbd5c78f8748e69c6dfa6cccadb92cc99d9ac0a4b66adb339c805770cea2dbe694586a2c757e9ed307a6