Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
207s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
filmora_setup_full7598.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
filmora_setup_full7598.exe
Resource
win7-20221111-en
Behavioral task
behavioral3
Sample
filmora_setup_full7598.exe
Resource
win10v2004-20221111-en
General
-
Target
filmora_setup_full7598.exe
-
Size
1.2MB
-
MD5
0f31bd7bd185bcdb23fd724cfa14e240
-
SHA1
40a0212e1d8fff17b59bd4866bc4394ce844eb10
-
SHA256
c442f8cbf49f1fa10b31c765812ed6a65169baecefb751b4ed46175db852de15
-
SHA512
bf0422a9dfa9d0a3a266976dfe6263fd90024666aff3a54cb10a2df292387ed8b78a82b62b3e955fac40e24a8b8647b94a39c596a2bd7d1d979688749d89b1f4
-
SSDEEP
24576:KPx2Qnyr4NvGXVT/H2HCmUykZgV88UA3fx6aNjLSHTV2WwqNqGZHLCmN:3Qnyr4NeX5/2HCmUykuie3f9NncLNTZB
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation filmora_setup_full7598.exe -
Executes dropped EXE 1 IoCs
pid Process 3784 NFWCHK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1352 filmora_setup_full7598.exe 1352 filmora_setup_full7598.exe 1352 filmora_setup_full7598.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3784 1352 filmora_setup_full7598.exe 84 PID 1352 wrote to memory of 3784 1352 filmora_setup_full7598.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\filmora_setup_full7598.exe"C:\Users\Admin\AppData\Local\Temp\filmora_setup_full7598.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe2⤵
- Executes dropped EXE
PID:3784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
229B
MD5ad0967a0ab95aa7d71b3dc92b71b8f7a
SHA1ed63f517e32094c07a2c5b664ed1cab412233ab5
SHA2569c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc
SHA51285766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b