Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15/02/2023, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe
Resource
win10-20220901-en
General
-
Target
12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe
-
Size
1.3MB
-
MD5
36b2dea25cf6a1ffa38fd5a9ffcb3e87
-
SHA1
f046b70ffbe7391492f27c525a498c639badff2d
-
SHA256
12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624
-
SHA512
1916cd39ecd2a6698fd076493431f53c42a7715857a37108cd8688b11057d37036dc9d24f270da6ec9aedac591a46d8ac89f2e21e65e964c82cfe81d5257f9ad
-
SSDEEP
24576:WBqaS/LEM2oJyfXFatVUXkSX/RL5wV+Y2UYNis/fF:WBqaaRiXFlXkSX/R917pxF
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4220 rundll32.exe 4220 rundll32.exe 4420 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2456 2188 12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe 67 PID 2188 wrote to memory of 2456 2188 12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe 67 PID 2188 wrote to memory of 2456 2188 12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe 67 PID 2456 wrote to memory of 4220 2456 control.exe 68 PID 2456 wrote to memory of 4220 2456 control.exe 68 PID 2456 wrote to memory of 4220 2456 control.exe 68 PID 4220 wrote to memory of 3160 4220 rundll32.exe 69 PID 4220 wrote to memory of 3160 4220 rundll32.exe 69 PID 3160 wrote to memory of 4420 3160 RunDll32.exe 70 PID 3160 wrote to memory of 4420 3160 RunDll32.exe 70 PID 3160 wrote to memory of 4420 3160 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe"C:\Users\Admin\AppData\Local\Temp\12da530c7933746808be1f652875b19492eef93446fe96f096bfc7ffcba55624.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\HIYA1G9.cpl",5⤵
- Loads dropped DLL
PID:4420
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141
-
Filesize
1.3MB
MD5f3026d47d67687b7f1f4240043c5b8fa
SHA19e29e07d30cce592b452b9753487ad9007666550
SHA256c0f77e2f76bcf073fe0d2ade8cb13cd64222318b760a92e246afc186350f479c
SHA512df6a97204b6536f89fdfd08a09966b0a04d771f6f4711a15d3c19afd1e25eb20beb64b5acfbbb3cef1b081265122a9366420c4904e494d1b8918eb59de702141