Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    297s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/02/2023, 04:47

General

  • Target

    218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe

  • Size

    1.3MB

  • MD5

    21fc808d0840be3366ef79e5a15c51a4

  • SHA1

    c9c3d63a7fa8f99766fb0560dd14a70e90e57c4a

  • SHA256

    218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498

  • SHA512

    8a31f7f6a13ac29bab131af93908f76434457039d6be69158bbc7991bb73d5871fed2cb16ef68076ba614128fdeb73c30043f038cb4e2f41d1d311c2554361fa

  • SSDEEP

    12288:X2hfjFNHUaymttZedE59j8fmVuXQ54jNg6QDloO7pe54ZHW4WASSxqHs9Enat0N+:QjDUaFbwWqW6H5QHWjiqH67V0AMwrdb

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
    "C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANAA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3616
    • C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
      C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe.log

    Filesize

    1KB

    MD5

    ae29b7a843805f722aece191ec9a1c26

    SHA1

    1be44463fa3fa8d0992fafb8061b617a5eb4eb64

    SHA256

    df1da27f39fde354f2ab49764b6b3bed10fe9e823bcca5efe360548db3e82de1

    SHA512

    357281829a54bc24d38337b54ebc5b7bcaca63152a1d84b0cdefed199e7c2183f124f9a29b94fa4f1fd95bd659f335124bf5450a4e0591af885e92d117498cbc

  • memory/2296-144-0x0000027F69830000-0x0000027F6987C000-memory.dmp

    Filesize

    304KB

  • memory/2296-143-0x0000027F694A0000-0x0000027F694EE000-memory.dmp

    Filesize

    312KB

  • memory/2296-142-0x0000027F69680000-0x0000027F6972A000-memory.dmp

    Filesize

    680KB

  • memory/2296-139-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/3316-120-0x000001A9ACE10000-0x000001A9ACEA2000-memory.dmp

    Filesize

    584KB

  • memory/3316-121-0x000001A9AAEC0000-0x000001A9AAEE2000-memory.dmp

    Filesize

    136KB

  • memory/3316-117-0x000001A990840000-0x000001A990986000-memory.dmp

    Filesize

    1.3MB

  • memory/3316-119-0x000001A9ACD50000-0x000001A9ACE0C000-memory.dmp

    Filesize

    752KB

  • memory/3316-118-0x000001A9ACA10000-0x000001A9ACB56000-memory.dmp

    Filesize

    1.3MB

  • memory/3616-130-0x000001A52DBF0000-0x000001A52DC66000-memory.dmp

    Filesize

    472KB