Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2022, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
Set-Up.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Set-Up.exe
Resource
win10v2004-20220812-en
General
-
Target
Set-Up.exe
-
Size
54.7MB
-
MD5
333bba364d4d009ae856418f4d4facbc
-
SHA1
24cbf0dec314e1658133485a1913239a54bb7891
-
SHA256
c2e6a132106f2c7ac254447dbd160c9d1d7acd06dd16a6d7d2100c5602fc8f72
-
SHA512
ffd82dad6afc35be55c39c659a5328d9ddcc958d3dd46a2c509ae733f1206ed6a16b8f382e7c0536222e01c25928fea85d2f47f7b5f845bf59d9bec93f75b421
-
SSDEEP
1572864:L6zmuyS1xkPeXU25Vw8IuEd0QhF/H3kpN:L6zmuykxkRG2du80Vz
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000400000001e2cd-133.dat acprotect -
resource yara_rule behavioral2/files/0x000400000001e2cd-133.dat upx behavioral2/memory/4176-137-0x0000000074E80000-0x0000000074E8A000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 4176 Set-Up.exe 4176 Set-Up.exe 4176 Set-Up.exe 4176 Set-Up.exe 4176 Set-Up.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5243bf44688b131c3171f2827a93e39dc
SHA107e9c7bd16ae47953e42c06ae2606de188386f35
SHA25604a577df50431eb0ff6fb103566402bf66c50415bcc1f8a86b9c235053131455
SHA512a1a8c21d38c54a43d1c6c394f481dfbddcb359c617e9928ecca8f84d47354616a78d20735a1fe7bebd21626c21cf96d0e1a69e3e98f6b35f2a774cc0244f9516
-
Filesize
4KB
MD571c46b663baa92ad941388d082af97e7
SHA15a9fcce065366a526d75cc5ded9aade7cadd6421
SHA256bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e
SHA5125965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce
-
Filesize
5KB
MD540eaa85160444940ff71d7aec7c6aa39
SHA162b0c779f32af751f3ef00833d3f5c75ed9f081d
SHA256b4e00150349af7a646a84792b565a0c81f080a838a6e0da69e5cf8f4cdc560a3
SHA5126d9e04dae68f9fd78a4f20a1d3fd34a9b92cf78b554d1e3e8e7fc3b2881d4659e49346f707cab43fd72c001ac192516deea7ef458ecab6b9f74b16ec05382ab4
-
Filesize
11KB
MD58571f5fc7f75b0ee8d99849a147e0a67
SHA10881a57ef76dae56454d3af836f0f8da8e583d49
SHA2566c84f2582301ac235aa5ad222c7138f44f262d7a03dcab2a293f0f2a5e32c002
SHA512e1e5854e9378f0c9d8590b66c10e23b56977ba367d724e272f5714b16845369d53a4bab29f0d41a9bb383032f7fb4ea3d814bf13b7fbb29a04f5876c14d61e76
-
Filesize
9KB
MD52d4e6314e1291e211f3326b9e9a7be8c
SHA167236ee783506c854a40229f311eec7f8a74d218
SHA25601c37f54c7019f09734ce28ac929d2f1f3da1ae469282a6df1d34b69b8ff9280
SHA5126063b3f82376cacf95bcc70061cb29bd2c4261959cfa1063426f4b4617e399d263f4ad63551ec64187ec04b847304bfd1cbbbc6825c810cecdff5b17f0b64fd1