Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
05/02/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
Resource
win10-20220901-en
General
-
Target
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe
-
Size
1.3MB
-
MD5
21fc808d0840be3366ef79e5a15c51a4
-
SHA1
c9c3d63a7fa8f99766fb0560dd14a70e90e57c4a
-
SHA256
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498
-
SHA512
8a31f7f6a13ac29bab131af93908f76434457039d6be69158bbc7991bb73d5871fed2cb16ef68076ba614128fdeb73c30043f038cb4e2f41d1d311c2554361fa
-
SSDEEP
12288:X2hfjFNHUaymttZedE59j8fmVuXQ54jNg6QDloO7pe54ZHW4WASSxqHs9Enat0N+:QjDUaFbwWqW6H5QHWjiqH67V0AMwrdb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498 = "\"C:\\Users\\Admin\\AppData\\Roaming\\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe\"" 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3316 set thread context of 2296 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3616 powershell.exe 3616 powershell.exe 3616 powershell.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe Token: SeDebugPrivilege 2296 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3316 wrote to memory of 3616 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 67 PID 3316 wrote to memory of 3616 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 67 PID 3316 wrote to memory of 2296 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 70 PID 3316 wrote to memory of 2296 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 70 PID 3316 wrote to memory of 2296 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 70 PID 3316 wrote to memory of 2296 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 70 PID 3316 wrote to memory of 2296 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 70 PID 3316 wrote to memory of 2296 3316 218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe"C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANAA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exeC:\Users\Admin\AppData\Local\Temp\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498.exe.log
Filesize1KB
MD5ae29b7a843805f722aece191ec9a1c26
SHA11be44463fa3fa8d0992fafb8061b617a5eb4eb64
SHA256df1da27f39fde354f2ab49764b6b3bed10fe9e823bcca5efe360548db3e82de1
SHA512357281829a54bc24d38337b54ebc5b7bcaca63152a1d84b0cdefed199e7c2183f124f9a29b94fa4f1fd95bd659f335124bf5450a4e0591af885e92d117498cbc