Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe
Resource
win10v2004-20220901-en
General
-
Target
69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe
-
Size
1.4MB
-
MD5
cc1ee2c94fd6e29533ff7ff4b543cefe
-
SHA1
dd13f3034473fd11811914692e1b0cec02492e8f
-
SHA256
69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115
-
SHA512
8cf4ec52b31f10ed5772bfb24ce1402ad771f69cb5b36e8ba2c25f709244b3d24c3eb9eb8da929e05a3d6c2977dc3bcf4975fabec7de87e5aac6751596716264
-
SSDEEP
24576:WBqaS/LEMbhVLYv5xyVCqPV81Fpn+LqYGAeJ/7HoEHkTKQZx12:WBqaab0vTyVCxN+LqhZJ/UZy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe -
Loads dropped DLL 2 IoCs
pid Process 3240 rundll32.exe 4292 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1736 1780 69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe 82 PID 1780 wrote to memory of 1736 1780 69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe 82 PID 1780 wrote to memory of 1736 1780 69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe 82 PID 1736 wrote to memory of 3240 1736 control.exe 84 PID 1736 wrote to memory of 3240 1736 control.exe 84 PID 1736 wrote to memory of 3240 1736 control.exe 84 PID 3240 wrote to memory of 4528 3240 rundll32.exe 91 PID 3240 wrote to memory of 4528 3240 rundll32.exe 91 PID 4528 wrote to memory of 4292 4528 RunDll32.exe 92 PID 4528 wrote to memory of 4292 4528 RunDll32.exe 92 PID 4528 wrote to memory of 4292 4528 RunDll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe"C:\Users\Admin\AppData\Local\Temp\69e210502c9040f9ce7b10fc57321f35d0daf0fcd904e1d75c29f8b1713b1115.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\MYKU.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\MYKU.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\MYKU.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\MYKU.CpL",5⤵
- Loads dropped DLL
PID:4292
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b99db11a215ec4541a842b0047a53076
SHA1c48f467a5f64c09a95807d11c3d959273e868d82
SHA256fd263494f916974db9d5adb994691a00dfabc7a22ab5d275a8c0fdbe5d018d27
SHA512481c4c60ee6d9836bfcd7f082260f498661bce3885af6ea3360a7714bfb0cf7fba75e658059d8099116bbf5184b84e1b6c10ae6b3202fe028be3bde6646f5621
-
Filesize
1.6MB
MD5b99db11a215ec4541a842b0047a53076
SHA1c48f467a5f64c09a95807d11c3d959273e868d82
SHA256fd263494f916974db9d5adb994691a00dfabc7a22ab5d275a8c0fdbe5d018d27
SHA512481c4c60ee6d9836bfcd7f082260f498661bce3885af6ea3360a7714bfb0cf7fba75e658059d8099116bbf5184b84e1b6c10ae6b3202fe028be3bde6646f5621
-
Filesize
1.6MB
MD5b99db11a215ec4541a842b0047a53076
SHA1c48f467a5f64c09a95807d11c3d959273e868d82
SHA256fd263494f916974db9d5adb994691a00dfabc7a22ab5d275a8c0fdbe5d018d27
SHA512481c4c60ee6d9836bfcd7f082260f498661bce3885af6ea3360a7714bfb0cf7fba75e658059d8099116bbf5184b84e1b6c10ae6b3202fe028be3bde6646f5621