Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15/01/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe
Resource
win10-20220901-en
General
-
Target
633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe
-
Size
1.3MB
-
MD5
b975025be071b6e0c3e371a65918ac2f
-
SHA1
4c9202e37df828c83254ccd6b52abada25e7ad30
-
SHA256
633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d
-
SHA512
ea5c4ecb160ce12c4f9cd8a23d8fafde459b7da4bc2a2b74ddb1c526deac89b1a07eaba8c2944bb5778eff7e7f1d17c7bc6e88cc10b15e46feefb432af4b93c1
-
SSDEEP
24576:zry2uXzmwLXrtgvug9g840scr2Zo7S4CqzWLATBem2eVc3nDIQiMYUjb:zunLKWuFrnr2ZSdCqzLcgfQzYU/
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4444 rundll32.exe 3968 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3548 2484 633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe 66 PID 2484 wrote to memory of 3548 2484 633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe 66 PID 2484 wrote to memory of 3548 2484 633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe 66 PID 3548 wrote to memory of 4444 3548 control.exe 68 PID 3548 wrote to memory of 4444 3548 control.exe 68 PID 3548 wrote to memory of 4444 3548 control.exe 68 PID 4444 wrote to memory of 3196 4444 rundll32.exe 69 PID 4444 wrote to memory of 3196 4444 rundll32.exe 69 PID 3196 wrote to memory of 3968 3196 RunDll32.exe 70 PID 3196 wrote to memory of 3968 3196 RunDll32.exe 70 PID 3196 wrote to memory of 3968 3196 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe"C:\Users\Admin\AppData\Local\Temp\633bdfac10a5794378a64f0f57a48f4eeed00b699d93fe5b0ac7e2718a2c083d.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\vHHIZP.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vHHIZP.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vHHIZP.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\vHHIZP.cpL",5⤵
- Loads dropped DLL
PID:3968
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56ce52af7bed44ec6d0af97056fd21463
SHA1ea351487d97adedc5488a342bdca36d315b14381
SHA256ff2e2127dd0d21ed725a7e8d73ee49b945a2e21735b6ba0f6322d2b295c31922
SHA512ddac41572cb3188fb98eedc00e4b8d324f18a053075aec5aca58994404bb1d756f56ab22712a957c13dc5831f3aed5f12bf7ae806e231b33b6a1a97c0b9b3745
-
Filesize
1.4MB
MD56ce52af7bed44ec6d0af97056fd21463
SHA1ea351487d97adedc5488a342bdca36d315b14381
SHA256ff2e2127dd0d21ed725a7e8d73ee49b945a2e21735b6ba0f6322d2b295c31922
SHA512ddac41572cb3188fb98eedc00e4b8d324f18a053075aec5aca58994404bb1d756f56ab22712a957c13dc5831f3aed5f12bf7ae806e231b33b6a1a97c0b9b3745
-
Filesize
1.4MB
MD56ce52af7bed44ec6d0af97056fd21463
SHA1ea351487d97adedc5488a342bdca36d315b14381
SHA256ff2e2127dd0d21ed725a7e8d73ee49b945a2e21735b6ba0f6322d2b295c31922
SHA512ddac41572cb3188fb98eedc00e4b8d324f18a053075aec5aca58994404bb1d756f56ab22712a957c13dc5831f3aed5f12bf7ae806e231b33b6a1a97c0b9b3745