Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2023, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe
Resource
win7-20220812-en
General
-
Target
7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe
-
Size
325KB
-
MD5
ccc9cd1a0772e295f72dbdc593fd1b91
-
SHA1
673cb93a2ad861349df4ec838a27e19e87a05854
-
SHA256
7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
-
SHA512
242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
SSDEEP
3072:v5GRgsjPSgA5h45E17LNxEcsEqUhsSz9gjO8hN9fQomjKgvQ/IeXc4yjLUHy3L6n:v3sjKjJlDswsSh679xmjRvyg6yMTW9x
Malware Config
Extracted
amadey
3.50
193.56.146.243/h8V2cQlbd3/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3088 rovwer.exe 3728 rovwer.exe 4432 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 5064 2412 WerFault.exe 78 2132 3728 WerFault.exe 86 752 4432 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3088 2412 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 79 PID 2412 wrote to memory of 3088 2412 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 79 PID 2412 wrote to memory of 3088 2412 7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe 79 PID 3088 wrote to memory of 5036 3088 rovwer.exe 83 PID 3088 wrote to memory of 5036 3088 rovwer.exe 83 PID 3088 wrote to memory of 5036 3088 rovwer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe"C:\Users\Admin\AppData\Local\Temp\7b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:5036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 11362⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2412 -ip 24121⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 4322⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3728 -ip 37281⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 4202⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4432 -ip 44321⤵PID:4388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc
-
Filesize
325KB
MD5ccc9cd1a0772e295f72dbdc593fd1b91
SHA1673cb93a2ad861349df4ec838a27e19e87a05854
SHA2567b5a3705613370566fc71e12612c3952c763476a3df5f66c83bea6f64660e3b1
SHA512242f0bd5afb77feaff5c697c4e960589e1bb80615cc93dcafbb2b10e945f3a14c0d67ad34185104988d6b7cd70cc2e5424e6992270b10079e98604b378d0ecbc