Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe
Resource
win10v2004-20220812-en
General
-
Target
b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe
-
Size
11.9MB
-
MD5
fb4debd112aceb8682f807251ad5a916
-
SHA1
68ac6f256cdb5fb4dd49504915fb5e23ec68d4d6
-
SHA256
b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9
-
SHA512
17f362c89624b278296f8e1f73e100e165b81d13ee7dca277229b6a9596f2513fb9639349620a2b55badbb8c5c55521f01c51ffe918fb063b3a061cdd8d36bdb
-
SSDEEP
196608:xEP+6cL/922hPs7wcjJoRkT1Rz+ie8YqS0PTMhcst6qlz/djYdCK02WtuniyskwQ:2P+6a08U7wclleCLTMhcy6qlz1R92Uu1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe -
Executes dropped EXE 2 IoCs
pid Process 2324 setup.exe 4216 is-BM0QC.tmp -
Loads dropped DLL 2 IoCs
pid Process 4216 is-BM0QC.tmp 4216 is-BM0QC.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2324 1180 b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe 81 PID 1180 wrote to memory of 2324 1180 b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe 81 PID 1180 wrote to memory of 2324 1180 b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe 81 PID 2324 wrote to memory of 4216 2324 setup.exe 82 PID 2324 wrote to memory of 4216 2324 setup.exe 82 PID 2324 wrote to memory of 4216 2324 setup.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe"C:\Users\Admin\AppData\Local\Temp\b8929963c073acc1e20a696ada8d2990c3baeed41e22078eed6232a37b853af9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\RepTasks2012\setup.exe"C:\RepTasks2012\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\is-1E9Q9.tmp\is-BM0QC.tmp"C:\Users\Admin\AppData\Local\Temp\is-1E9Q9.tmp\is-BM0QC.tmp" /SL4 $5011A C:\RepTasks2012\setup.exe 7742148 727043⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4216
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD5339917d6c5f2ca27cc9b13cb6da6bea2
SHA188899ca8178def48f8c2d78a7c009a74e2889efe
SHA2565e355e921951e8456f98c38163f182d8ddaa4d24eb126c93177f0a8d09de227d
SHA512347a5ba8c739a8f9c33764162b9116d281c922687e6ae99f325b9044c8655680b3f02c045dfb901243e3b1dba14f8c6784b5dfb71aa5e874929b54774e3cd950
-
Filesize
10.6MB
MD5339917d6c5f2ca27cc9b13cb6da6bea2
SHA188899ca8178def48f8c2d78a7c009a74e2889efe
SHA2565e355e921951e8456f98c38163f182d8ddaa4d24eb126c93177f0a8d09de227d
SHA512347a5ba8c739a8f9c33764162b9116d281c922687e6ae99f325b9044c8655680b3f02c045dfb901243e3b1dba14f8c6784b5dfb71aa5e874929b54774e3cd950
-
Filesize
13.3MB
MD5dfaa0ffd9ca26dd3bafcda07e6e601eb
SHA1e89c038b24172a86e3b0b2f007e043631aa05a2e
SHA256cc5597b5a6c9dfb96d3a5079cf42f27ef7e5e1cf914c050bcb2602914921df48
SHA5120707c6f6e29543bf7f7fe159dca74832ede537c61b5b2abbb368cfe7511e224faabccfc1836abb03b920f35d00b033fc0c19723263264d2f5b2d0a1513ca4269
-
Filesize
13.3MB
MD5dfaa0ffd9ca26dd3bafcda07e6e601eb
SHA1e89c038b24172a86e3b0b2f007e043631aa05a2e
SHA256cc5597b5a6c9dfb96d3a5079cf42f27ef7e5e1cf914c050bcb2602914921df48
SHA5120707c6f6e29543bf7f7fe159dca74832ede537c61b5b2abbb368cfe7511e224faabccfc1836abb03b920f35d00b033fc0c19723263264d2f5b2d0a1513ca4269
-
Filesize
12KB
MD59f015911c4073ba9b8ad5a4c36fcaf88
SHA1d4bd8d2348a2a6294f3f92ad7831f2cf660da6a5
SHA256c630fb87c007c1e3d008eac97edf7e025c0cb806c886971e32b7063d606fd125
SHA512c36dc582141259ec0813edf531431870f96acc346e3f9af0cd86544245a84bb2d6bc4c37518bf309fa0922cdd5535d087e4fef20f0d5aa0494b1a4b0ce388ea9
-
Filesize
12KB
MD59f015911c4073ba9b8ad5a4c36fcaf88
SHA1d4bd8d2348a2a6294f3f92ad7831f2cf660da6a5
SHA256c630fb87c007c1e3d008eac97edf7e025c0cb806c886971e32b7063d606fd125
SHA512c36dc582141259ec0813edf531431870f96acc346e3f9af0cd86544245a84bb2d6bc4c37518bf309fa0922cdd5535d087e4fef20f0d5aa0494b1a4b0ce388ea9