Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
ghxkehgertedtyp.c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ghxkehgertedtyp.c.exe
Resource
win10v2004-20230220-en
General
-
Target
ghxkehgertedtyp.c.exe
-
Size
7.5MB
-
MD5
f5d957a42f578847664cacb8a4c3d695
-
SHA1
5affbea912936570480b7a6a0a7e67c6a2f62ec9
-
SHA256
00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc
-
SHA512
07821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980
-
SSDEEP
196608:ZOtzW0BrGc/4GmLcBh8YSZIEqsyZr2caC78:kVW6Gc//B/xEh+a
Malware Config
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation ghxkehgertedtyp.c.exe -
Executes dropped EXE 1 IoCs
pid Process 4660 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" ghxkehgertedtyp.c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2548 ghxkehgertedtyp.c.exe 2548 ghxkehgertedtyp.c.exe 4660 svcservice.exe 4660 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2548 ghxkehgertedtyp.c.exe 2548 ghxkehgertedtyp.c.exe 2548 ghxkehgertedtyp.c.exe 2548 ghxkehgertedtyp.c.exe 4660 svcservice.exe 4660 svcservice.exe 4660 svcservice.exe 4660 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 4660 2548 ghxkehgertedtyp.c.exe 96 PID 2548 wrote to memory of 4660 2548 ghxkehgertedtyp.c.exe 96 PID 2548 wrote to memory of 4660 2548 ghxkehgertedtyp.c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ghxkehgertedtyp.c.exe"C:\Users\Admin\AppData\Local\Temp\ghxkehgertedtyp.c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316.1MB
MD53b3bed3fb44b0233db9d2e67b916ef8d
SHA187171aa23b7393d3cb3a8c046fa426131d0e364a
SHA25635b2226826ce72ca5eb665e8488ad60405445677967db5854e36e4c1326be329
SHA512770db84047dff127a30078e1e66a4b1adfa33c8536440bce8e65aa7ee6959235e3e4935769efca67f8dd69cd7b26395c90ee6737b6e9edfc6e85b9774965e054
-
Filesize
251.6MB
MD52f0d9ddd83046f2ca10c1b51896c62b4
SHA150b11221efa5e18b5e7adda0c231eebac1abf3cc
SHA256ce5915c28a474f8902e99bc5d2d542edf05ba6150735040fcc50ac4b5e8bb724
SHA5125c229f0482420615b073475552245f8ce87d431b9e49db4638319d2f8b112178c81e21a7867a9aad87b0b7a2ce205804f5de253ebf9a8755ebf113c7f9e70027
-
Filesize
298.2MB
MD5139e690f66223a1fe9544227517d100e
SHA1a67a23c16c2d11518b15f74b2838f990c8ac7c9a
SHA2562543ed8530bddf94f0e2afbc9a97ae635dee8ac11ccc87dbe898ea4ed32e986e
SHA512bdd32d0e68e929cc3972be9342e3d73ad1306a4f9b8d1205e2212a3d7968a491b70021d0f9253a03bf2059275239e46d44a7ec8b012f419ec2109706ea14af8c