Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26/12/2022, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe
Resource
win10-20220812-en
General
-
Target
9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe
-
Size
1.8MB
-
MD5
a34e739ad6600deb3da7f079ff92ba01
-
SHA1
fff1688ff004705f313cb6d825a766359f1da55d
-
SHA256
9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9
-
SHA512
50915a31d1c9b91e72ac08ce7677bff04954a0b689c68386ac339e7cfa5d37d3c82fffa592143f4342823736ffc4c80b64a0f5e5c269fbe6fce3ceb99dcef507
-
SSDEEP
49152:mSpKv8jwpX9rIMpG9sIgaPYpksP88yo485WwFXnM1ggX:mSyewE/9skPWO8yd1w1glX
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4296 rundll32.exe 3764 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings 9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4328 wrote to memory of 4556 4328 9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe 66 PID 4328 wrote to memory of 4556 4328 9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe 66 PID 4328 wrote to memory of 4556 4328 9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe 66 PID 4556 wrote to memory of 4296 4556 control.exe 68 PID 4556 wrote to memory of 4296 4556 control.exe 68 PID 4556 wrote to memory of 4296 4556 control.exe 68 PID 4296 wrote to memory of 3060 4296 rundll32.exe 69 PID 4296 wrote to memory of 3060 4296 rundll32.exe 69 PID 3060 wrote to memory of 3764 3060 RunDll32.exe 70 PID 3060 wrote to memory of 3764 3060 RunDll32.exe 70 PID 3060 wrote to memory of 3764 3060 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe"C:\Users\Admin\AppData\Local\Temp\9f89e48d4f5253c62ab13b35e00958bef016150dac7941185d19f1d0103aa5f9.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\AOtF.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\AOtF.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\AOtF.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\AOtF.CpL",5⤵
- Loads dropped DLL
PID:3764
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5db40c2e3ac8405f783c8c40f278fc848
SHA1e4d905a540ca1d303689b71b011e1c118f9bbf7c
SHA256247dc7d9288e8b45fb83f16564b188ed4de1f68b0c84f7f6caf94f790a8a9515
SHA5122d27ec6f5340125929f444785739125aebd3dd8c6acb81297dbb5cfafdc3e522eeedc14026255f17b16fc9fa59967cb5eb0c6af83945dc36bb6ce3e81b0f27e4
-
Filesize
1.4MB
MD5db40c2e3ac8405f783c8c40f278fc848
SHA1e4d905a540ca1d303689b71b011e1c118f9bbf7c
SHA256247dc7d9288e8b45fb83f16564b188ed4de1f68b0c84f7f6caf94f790a8a9515
SHA5122d27ec6f5340125929f444785739125aebd3dd8c6acb81297dbb5cfafdc3e522eeedc14026255f17b16fc9fa59967cb5eb0c6af83945dc36bb6ce3e81b0f27e4
-
Filesize
1.4MB
MD5db40c2e3ac8405f783c8c40f278fc848
SHA1e4d905a540ca1d303689b71b011e1c118f9bbf7c
SHA256247dc7d9288e8b45fb83f16564b188ed4de1f68b0c84f7f6caf94f790a8a9515
SHA5122d27ec6f5340125929f444785739125aebd3dd8c6acb81297dbb5cfafdc3e522eeedc14026255f17b16fc9fa59967cb5eb0c6af83945dc36bb6ce3e81b0f27e4