Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/03/2023, 21:50
230308-1pyvasgc3t 808/03/2023, 21:48
230308-1n5apahc88 108/03/2023, 21:45
230308-1mhejagc2w 108/03/2023, 12:51
230308-p3h58ada29 3Analysis
-
max time kernel
50s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
08/03/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
stage4_after_autoit.dll
Resource
win10v2004-20230220-es
General
-
Target
stage4_after_autoit.dll
-
Size
27.9MB
-
MD5
cf6c8c2264f48739230e812d9c0a52c0
-
SHA1
eec61aa4a98726c0634a16aaa41e76ef1d87a42f
-
SHA256
9d93a71a00351322c77e85e297cf58155f2049ad42ef475029cfdb7b913560c9
-
SHA512
ab99d12d41adecbf24e340c39f7208fd8c4f97220244dd700ef109d2809ff27dca28eee1d8b6eeeaf0422fdc158dba2f45a0e13008a2edc31c4d2ddf6f2cc1a0
-
SSDEEP
98304:l62O/te/kRbtH8Jqr9N4eExVrYHYwBtBjZADA0Pjq:w/g/i3rCV6btBjODFPW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 932 4664 WerFault.exe 84 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion rundll32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1456 wrote to memory of 4664 1456 rundll32.exe 84 PID 1456 wrote to memory of 4664 1456 rundll32.exe 84 PID 1456 wrote to memory of 4664 1456 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\stage4_after_autoit.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\stage4_after_autoit.dll,#12⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 10563⤵
- Program crash
PID:932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4664 -ip 46641⤵PID:1440