Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2023, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
51a709bfee4438611f3afbe3fd4a9257.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
51a709bfee4438611f3afbe3fd4a9257.exe
Resource
win10v2004-20220812-en
General
-
Target
51a709bfee4438611f3afbe3fd4a9257.exe
-
Size
580KB
-
MD5
51a709bfee4438611f3afbe3fd4a9257
-
SHA1
7352a87e19c7b949643811d50b0a6f0e170cf6ac
-
SHA256
1cf4ca22e9fae2f14ec510910ca68dbe2bdad715af613b391bcb53414ddeb19f
-
SHA512
e5a46cbd165dc71893740d043816f7802dfb5126f2527eadb6372921c14c5477623da493f83da08b0f075ed630fb8ac447358d2590a179bb9ff530b840c33b16
-
SSDEEP
12288:PKqjWycOHr+5n1UxrSAHAhsxwpdBLIartbDA+VI2CZQi6sFIMyYOGqa4c:PKgyTmQyaTBN5k+VI2Cx6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4944 51a709bfee4438611f3afbe3fd4a9257.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 51a709bfee4438611f3afbe3fd4a9257.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 51a709bfee4438611f3afbe3fd4a9257.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1980 powershell.exe 1980 powershell.exe 4944 51a709bfee4438611f3afbe3fd4a9257.exe 4944 51a709bfee4438611f3afbe3fd4a9257.exe 4944 51a709bfee4438611f3afbe3fd4a9257.exe 4944 51a709bfee4438611f3afbe3fd4a9257.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe 2508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5100 51a709bfee4438611f3afbe3fd4a9257.exe Token: SeDebugPrivilege 1980 powershell.exe Token: SeDebugPrivilege 4944 51a709bfee4438611f3afbe3fd4a9257.exe Token: SeDebugPrivilege 2508 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1980 5100 51a709bfee4438611f3afbe3fd4a9257.exe 85 PID 5100 wrote to memory of 1980 5100 51a709bfee4438611f3afbe3fd4a9257.exe 85 PID 4944 wrote to memory of 2508 4944 51a709bfee4438611f3afbe3fd4a9257.exe 91 PID 4944 wrote to memory of 2508 4944 51a709bfee4438611f3afbe3fd4a9257.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a709bfee4438611f3afbe3fd4a9257.exe"C:\Users\Admin\AppData\Local\Temp\51a709bfee4438611f3afbe3fd4a9257.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Users\Admin\AppData\Roaming\51a709bfee4438611f3afbe3fd4a9257.exeC:\Users\Admin\AppData\Roaming\51a709bfee4438611f3afbe3fd4a9257.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 5; Stop-Process 4944 -Force; Start-Sleep -Seconds 2; Remove-Item "C:\Users\Admin\AppData\Roaming\51a709bfee4438611f3afbe3fd4a9257.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
621B
MD584ea4e5aedfded07182bbc69fa81eaff
SHA1d82d998cb3d655c49dba4fb923a3fc360a285ea2
SHA256299408135f6f265d6db7d42d5454a9be41bea2f72d8bb438d835de7c88c77653
SHA5127f654f76cb24399a8e8d35c2f5571b1560b7cbc38656ff687c88bdae4dff49437cc218653441380247b6de484be6557b62b138bb725f8a94b4e776175c979a60
-
Filesize
2KB
MD549e7d5f2a296b59afec08bc314bed998
SHA17f898bf195ffd46ce2d19fad0ce33155f6e47f5f
SHA256394832dfefa5e2e6204b60708a2ca33bb9d2f529664419bc050975f4b80faefe
SHA512f64579fdac0bfebad4c20ad575b8ea45136e295fba950da4cbf84402228a3897b2e2deb4eb4605deb5df93321b1dc15c8a878da36016d7e5e060182142fdf839
-
Filesize
1KB
MD585618f28ab1279a44b5027fb2bd7ddea
SHA1360f66dcc8d079e74afef69e3a204170ae01a4a5
SHA256d917a65c5fb3257c60a0633df5bf10135eecf86efa9a2f929474e2fbd6de38f1
SHA51247f6183a4586362b6d215fc13f990f78c05b5da96f07efab64f4b425613fc12e110cb847b33268648b424a5e314fa68da91d68dc1959655cbaae9836bfc6fc6e
-
Filesize
580KB
MD551a709bfee4438611f3afbe3fd4a9257
SHA17352a87e19c7b949643811d50b0a6f0e170cf6ac
SHA2561cf4ca22e9fae2f14ec510910ca68dbe2bdad715af613b391bcb53414ddeb19f
SHA512e5a46cbd165dc71893740d043816f7802dfb5126f2527eadb6372921c14c5477623da493f83da08b0f075ed630fb8ac447358d2590a179bb9ff530b840c33b16
-
Filesize
580KB
MD551a709bfee4438611f3afbe3fd4a9257
SHA17352a87e19c7b949643811d50b0a6f0e170cf6ac
SHA2561cf4ca22e9fae2f14ec510910ca68dbe2bdad715af613b391bcb53414ddeb19f
SHA512e5a46cbd165dc71893740d043816f7802dfb5126f2527eadb6372921c14c5477623da493f83da08b0f075ed630fb8ac447358d2590a179bb9ff530b840c33b16