Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe
Resource
win10v2004-20230220-en
General
-
Target
Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe
-
Size
266.6MB
-
MD5
e3960990152e104d016c4b8a05dc76ac
-
SHA1
8c5dfd0e9f37813d5168952432e914fe46fd0e4e
-
SHA256
f0440e7b72c0a54c815f09487afd1fe19f26a7c3616810402f6675af8ee08220
-
SHA512
e94ee98dd2102276d06ab074d2ca550dbb238895eaa9588df8aa97bfdecc85d0db36daa4ea7bce8edd68afe69852fc119a294043aedd496e4fab0732bdfc74b3
-
SSDEEP
98304:6NPgYs1HlKS+bjACZY3NoWHu7PcaHfVxv11m3ISv:6qYs1IMCyaHfVxN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe -
Executes dropped EXE 1 IoCs
pid Process 388 RtkDevChargerpSoundStationwtDriving.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 72 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 388 RtkDevChargerpSoundStationwtDriving.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3596 wrote to memory of 388 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 103 PID 3596 wrote to memory of 388 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 103 PID 3596 wrote to memory of 388 3596 Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe"C:\Users\Admin\AppData\Local\Temp\Archivo_DocumentoOIAXXNLJAIVYRNQtucyy.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\ProgramData\RtkDevChargerviGaming\RtkDevChargerpSoundStationwtDriving.exe"C:\ProgramData\RtkDevChargerviGaming\RtkDevChargerpSoundStationwtDriving.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5b2ce432a30aafd67a9ecd2eb58ba6523
SHA1a72fe46970bb1d3f4980ee396625e9da09be2b44
SHA256d998eb1ec500da8879f4145fa4ed24df7f4069e554f583ad288629692a13bfd0
SHA512aa5bbabc37ef67b6dc5100bf60bc3fc151fed9a94db5fab4afe7c9a7f066ac295b63756b92aa419913f878f658df2fbc789301ee637e6c912111c0d71abe0620
-
Filesize
368B
MD5e5126091e6bbd9ae4cb914d3a52d0fbd
SHA1eeacbf935bd662fdb89f0bcd19ad09a48128bb57
SHA256039dc89e84c456d969897724dc5e5aa6869ffdd2291ddc6821e17b3d8175a95d
SHA5126ead3dcae9bca528cd2a239b84a51e95e2a3550004c0ad58345e9838c728fc10cc0ead6fec9ef937a8b0b1b7b5a2c03b0005f939bd4b9ec390018d281765c86e
-
Filesize
215.2MB
MD5bfff4c31e2a5b9a74c977579d47b58d6
SHA1c6ad3bd591d7e0893b742f613b15d427cf6da6ef
SHA256fd4876b068129688ee64f93fa8c84c6e64d4194f38f0472ae65603c3708d228e
SHA512afef9f706b5e02486fd219f68d1aa05f9c1f854457d2955ab6489210fa58603dc8be67a0ac42d12bd8ad60dc685b556c896b3652a1edf31e2e640d00efdd5d6f
-
Filesize
135.0MB
MD58b0947edb065720c2aa1f76dcc6ee587
SHA1ff51ed1c37c04cbe9f924ecb310d159dc4bf5f68
SHA25606d0da3fde0fa39a07d30db0f9d8f504c63b62bdd3ccc405a4baf0e0cc1026d8
SHA512b3d22b3fc6b8a358a78a6ef5a53d5da2ba163ac6cda038f202e00b4f78211a379e04a8fd1ada7b50dccf5144b89a51343191e9eaa52f9a04640e8a7f932f806f
-
Filesize
94.8MB
MD525d9e5ccf64ad7f3ab18176b371ec208
SHA1b726f2cc972464c42bfd6f6c8659f2f5b2fada7f
SHA256a834a7b33ca7538502f14a1179096d5991d14e23eaf068e030f0ea7e89ce4974
SHA5121cde255c6e3bd4b3ec4884d708c57258c1a24c1d6b9a520189d7ac18d3ab5cab8e9b357f214584a56d21e9ccccd883ee5e19f9b74478e403a28d07e614b16cc0