Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe
Resource
win10v2004-20221111-en
General
-
Target
b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe
-
Size
1.3MB
-
MD5
bd7dc67b579e36ae5ea60a417a996387
-
SHA1
0b6118df3ed2ce77d5c2efae28357a6722a5bf0e
-
SHA256
b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809
-
SHA512
ebd24d4c6b2672c22edbbe4fdd0cd6fc672873a044817286af2119146a9ce05cb2bb566e8f1baecccd7e00766f315eacc3814d5c808a6a576ee611dd49a9abf9
-
SSDEEP
24576:YLeTtjJFtHrK3oJyfXFatVUXkSX/RL5wV+Y2UYNis/ftt:YLYkYiXFlXkSX/R917px/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe -
Loads dropped DLL 3 IoCs
pid Process 1992 rundll32.exe 1992 rundll32.exe 808 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2984 wrote to memory of 4792 2984 b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe 80 PID 2984 wrote to memory of 4792 2984 b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe 80 PID 2984 wrote to memory of 4792 2984 b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe 80 PID 4792 wrote to memory of 1992 4792 control.exe 82 PID 4792 wrote to memory of 1992 4792 control.exe 82 PID 4792 wrote to memory of 1992 4792 control.exe 82 PID 1992 wrote to memory of 4592 1992 rundll32.exe 83 PID 1992 wrote to memory of 4592 1992 rundll32.exe 83 PID 4592 wrote to memory of 808 4592 RunDll32.exe 84 PID 4592 wrote to memory of 808 4592 RunDll32.exe 84 PID 4592 wrote to memory of 808 4592 RunDll32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe"C:\Users\Admin\AppData\Local\Temp\b2341f8711f02bc45a19aeb11ff9300c2e39c66d93359db9214e23c1f21a8809.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\zZ4BoKY.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\zZ4BoKY.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\zZ4BoKY.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\zZ4BoKY.CPl",5⤵
- Loads dropped DLL
PID:808
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141