Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2023, 19:29

General

  • Target

    09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.exe

  • Size

    12.2MB

  • MD5

    61f5f816efc350225af977f9c9acb455

  • SHA1

    4f1421c7a380a6fc1da84b59f83de4621c2b6ebf

  • SHA256

    09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda

  • SHA512

    6248796d329d2a29d951151e3df906ffbaf68b5c4795b9f05274a5f3741722695351089c78f0239b9a7eb43473290310c469e7b4786f69e981010e3a605be1cf

  • SSDEEP

    393216:yEpreeMBILTjYSLUfO5RYqRy375pR03Cg:yEprZM2jXYrqUV703Cg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.exe
    "C:\Users\Admin\AppData\Local\Temp\09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\Temp\is-MB3MQ.tmp\09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-MB3MQ.tmp\09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.tmp" /SL5="$80052,12537378,52224,C:\Users\Admin\AppData\Local\Temp\09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.exe"
      2⤵
      • Executes dropped EXE
      PID:3212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-MB3MQ.tmp\09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.tmp

    Filesize

    660KB

    MD5

    2e33c302eabceb5f675129a82f1e1326

    SHA1

    5890daad301873089345a814d696c31ba5fe5330

    SHA256

    2cd3c5f925efbb379d42d4315c19f93e36921506ae990860c5d1008258fc8d7e

    SHA512

    aeb22a8671c5d04910755a9c3cbc65fb28c2fea8d2c45fb2e9acc7d162d96738691cd3778f8fa6a3d21e4e6afa4f2d97fcfc9787f72e973a6d4c7f1eb81600f5

  • C:\Users\Admin\AppData\Local\Temp\is-MB3MQ.tmp\09c0c09f94b4c7456d5b74794a52be0d5d7e33299c095f5c87b4c07f7b51acda.tmp

    Filesize

    660KB

    MD5

    2e33c302eabceb5f675129a82f1e1326

    SHA1

    5890daad301873089345a814d696c31ba5fe5330

    SHA256

    2cd3c5f925efbb379d42d4315c19f93e36921506ae990860c5d1008258fc8d7e

    SHA512

    aeb22a8671c5d04910755a9c3cbc65fb28c2fea8d2c45fb2e9acc7d162d96738691cd3778f8fa6a3d21e4e6afa4f2d97fcfc9787f72e973a6d4c7f1eb81600f5

  • memory/4244-132-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4244-137-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4244-138-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB