Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/01/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe
Resource
win10-20220812-en
General
-
Target
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe
-
Size
1.3MB
-
MD5
dbac267bf7959e4accd9e75b9f93cf8d
-
SHA1
d5e8f6e054338b9dcf6db7a218e4fd84a0c08ebe
-
SHA256
9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e
-
SHA512
4ba5528e1e6ad9339168bd3be914d3120e76a6139a68ebf917bea4cf21f45d239e4b73bfe0179bd6e12cb9f95bf9a7342ff2e2b324405a66a80692edd7ca3335
-
SSDEEP
24576:YLeTtjJFtHrK/EqQU2Gq1e8T+TyxvGHMPlLRK5qaHBGb/9JFDLuKYrB59Y:YLYkXU08STy4H6K5BBwze9Y
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4928 rundll32.exe 4280 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3768 wrote to memory of 5096 3768 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe 66 PID 3768 wrote to memory of 5096 3768 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe 66 PID 3768 wrote to memory of 5096 3768 9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe 66 PID 5096 wrote to memory of 4928 5096 control.exe 68 PID 5096 wrote to memory of 4928 5096 control.exe 68 PID 5096 wrote to memory of 4928 5096 control.exe 68 PID 4928 wrote to memory of 4276 4928 rundll32.exe 69 PID 4928 wrote to memory of 4276 4928 rundll32.exe 69 PID 4276 wrote to memory of 4280 4276 RunDll32.exe 70 PID 4276 wrote to memory of 4280 4276 RunDll32.exe 70 PID 4276 wrote to memory of 4280 4276 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe"C:\Users\Admin\AppData\Local\Temp\9fa03c4d61ca3f5b9a09932082d251a3dacae7a2a87ceb6fb15d3f49fdd2d48e.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\eGhoI.cPL",5⤵
- Loads dropped DLL
PID:4280
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54
-
Filesize
1.4MB
MD5c3a80081bac922d380a57398df69b988
SHA17b166e714d46c820e8e5d19563ab21c98d637450
SHA256451a47f79c650bd9f576d43914e841db794729afe604064859328db6dee51b91
SHA512f5556c3c180c69e4b92ed90a08d09a5b732a75cddea865a8091db360960a506c8bdfd9c0328f81588103f0c914b5bb6398fcfcb5a01774e70fd4b3384ce9ea54