Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/02/2023, 11:23

General

  • Target

    12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe

  • Size

    1.3MB

  • MD5

    36b2dea25cf6a1ffa38fd5a9ffcb3e87

  • SHA1

    f046b70ffbe7391492f27c525a498c639badff2d

  • SHA256

    12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624

  • SHA512

    1916cd39ecd2a6698fd076493431f53c42a7715857a37108cd8688b11057d37036dc9d24f270da6ec9aedac591a46d8ac89f2e21e65e964c82cfe81d5257f9ad

  • SSDEEP

    24576:WBqaS/LEM2oJyfXFatVUXkSX/RL5wV+Y2UYNis/fF:WBqaaRiXFlXkSX/R917pxF

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe
    "C:\Users\Admin\AppData\Local\Temp\12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4220
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3160
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",
            5⤵
            • Loads dropped DLL
            PID:4420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl

    Filesize

    1.3MB

    MD5

    f3026d47d67687b7f1f4240043c5b8fa

    SHA1

    9e29e07d30cce592b452b9753487ad9007666550

    SHA256

    c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c

    SHA512

    df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141

  • \Users\Admin\AppData\Local\Temp\hiYA1G9.cpl

    Filesize

    1.3MB

    MD5

    f3026d47d67687b7f1f4240043c5b8fa

    SHA1

    9e29e07d30cce592b452b9753487ad9007666550

    SHA256

    c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c

    SHA512

    df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141

  • \Users\Admin\AppData\Local\Temp\hiYA1G9.cpl

    Filesize

    1.3MB

    MD5

    f3026d47d67687b7f1f4240043c5b8fa

    SHA1

    9e29e07d30cce592b452b9753487ad9007666550

    SHA256

    c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c

    SHA512

    df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141

  • \Users\Admin\AppData\Local\Temp\hiYA1G9.cpl

    Filesize

    1.3MB

    MD5

    f3026d47d67687b7f1f4240043c5b8fa

    SHA1

    9e29e07d30cce592b452b9753487ad9007666550

    SHA256

    c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c

    SHA512

    df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141

  • memory/2188-156-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-157-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-149-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-153-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-155-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-154-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-159-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-160-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-161-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-158-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-163-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-175-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-178-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-181-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-182-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-184-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-185-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/2188-183-0x00000000779B0000-0x0000000077B3E000-memory.dmp

    Filesize

    1.6MB

  • memory/4220-282-0x0000000002700000-0x000000000284A000-memory.dmp

    Filesize

    1.3MB

  • memory/4420-337-0x0000000004B40000-0x0000000004B46000-memory.dmp

    Filesize

    24KB