Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 04:09
Behavioral task
behavioral1
Sample
0x00080000000122f6-1069.exe
Resource
win7-20230220-en
General
-
Target
0x00080000000122f6-1069.exe
-
Size
226KB
-
MD5
b83d2ac2529a2a414c1e45c47cefcde5
-
SHA1
e5759ba0f2af222c68d4bf6ee988e77d0b468934
-
SHA256
40c31618efd6d6a2e8cdb543c4356ba4d9b7403e15d3ef9efa8ea0ef3b6408e9
-
SHA512
b76fceffe3137ddd54318b48106911cf8c2bf0b8b1b9b3a0b1771dd6494261f2fe2530f8ddb1c2d4a71b76546eb172498eb339990a434011a667057627280570
-
SSDEEP
6144:4rzyIG8IcCnD5A2QdY8rWpau1CYUqfhYdMBg:KmlLnD5qdY8Fu1CYUehrBg
Malware Config
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 0x00080000000122f6-1069.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation metafor.exe -
Executes dropped EXE 3 IoCs
pid Process 3952 metafor.exe 1452 metafor.exe 1892 metafor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1032 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3952 2276 0x00080000000122f6-1069.exe 87 PID 2276 wrote to memory of 3952 2276 0x00080000000122f6-1069.exe 87 PID 2276 wrote to memory of 3952 2276 0x00080000000122f6-1069.exe 87 PID 3952 wrote to memory of 1032 3952 metafor.exe 88 PID 3952 wrote to memory of 1032 3952 metafor.exe 88 PID 3952 wrote to memory of 1032 3952 metafor.exe 88 PID 3952 wrote to memory of 216 3952 metafor.exe 90 PID 3952 wrote to memory of 216 3952 metafor.exe 90 PID 3952 wrote to memory of 216 3952 metafor.exe 90 PID 216 wrote to memory of 5068 216 cmd.exe 92 PID 216 wrote to memory of 5068 216 cmd.exe 92 PID 216 wrote to memory of 5068 216 cmd.exe 92 PID 216 wrote to memory of 4444 216 cmd.exe 93 PID 216 wrote to memory of 4444 216 cmd.exe 93 PID 216 wrote to memory of 4444 216 cmd.exe 93 PID 216 wrote to memory of 4136 216 cmd.exe 94 PID 216 wrote to memory of 4136 216 cmd.exe 94 PID 216 wrote to memory of 4136 216 cmd.exe 94 PID 216 wrote to memory of 3488 216 cmd.exe 95 PID 216 wrote to memory of 3488 216 cmd.exe 95 PID 216 wrote to memory of 3488 216 cmd.exe 95 PID 216 wrote to memory of 4644 216 cmd.exe 96 PID 216 wrote to memory of 4644 216 cmd.exe 96 PID 216 wrote to memory of 4644 216 cmd.exe 96 PID 216 wrote to memory of 4776 216 cmd.exe 97 PID 216 wrote to memory of 4776 216 cmd.exe 97 PID 216 wrote to memory of 4776 216 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00080000000122f6-1069.exe"C:\Users\Admin\AppData\Local\Temp\0x00080000000122f6-1069.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F3⤵
- Creates scheduled task(s)
PID:1032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5068
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:N"4⤵PID:4444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:R" /E4⤵PID:4136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:N"4⤵PID:4644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:R" /E4⤵PID:4776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe1⤵
- Executes dropped EXE
PID:1452
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe1⤵
- Executes dropped EXE
PID:1892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5b83d2ac2529a2a414c1e45c47cefcde5
SHA1e5759ba0f2af222c68d4bf6ee988e77d0b468934
SHA25640c31618efd6d6a2e8cdb543c4356ba4d9b7403e15d3ef9efa8ea0ef3b6408e9
SHA512b76fceffe3137ddd54318b48106911cf8c2bf0b8b1b9b3a0b1771dd6494261f2fe2530f8ddb1c2d4a71b76546eb172498eb339990a434011a667057627280570
-
Filesize
226KB
MD5b83d2ac2529a2a414c1e45c47cefcde5
SHA1e5759ba0f2af222c68d4bf6ee988e77d0b468934
SHA25640c31618efd6d6a2e8cdb543c4356ba4d9b7403e15d3ef9efa8ea0ef3b6408e9
SHA512b76fceffe3137ddd54318b48106911cf8c2bf0b8b1b9b3a0b1771dd6494261f2fe2530f8ddb1c2d4a71b76546eb172498eb339990a434011a667057627280570
-
Filesize
226KB
MD5b83d2ac2529a2a414c1e45c47cefcde5
SHA1e5759ba0f2af222c68d4bf6ee988e77d0b468934
SHA25640c31618efd6d6a2e8cdb543c4356ba4d9b7403e15d3ef9efa8ea0ef3b6408e9
SHA512b76fceffe3137ddd54318b48106911cf8c2bf0b8b1b9b3a0b1771dd6494261f2fe2530f8ddb1c2d4a71b76546eb172498eb339990a434011a667057627280570
-
Filesize
226KB
MD5b83d2ac2529a2a414c1e45c47cefcde5
SHA1e5759ba0f2af222c68d4bf6ee988e77d0b468934
SHA25640c31618efd6d6a2e8cdb543c4356ba4d9b7403e15d3ef9efa8ea0ef3b6408e9
SHA512b76fceffe3137ddd54318b48106911cf8c2bf0b8b1b9b3a0b1771dd6494261f2fe2530f8ddb1c2d4a71b76546eb172498eb339990a434011a667057627280570
-
Filesize
226KB
MD5b83d2ac2529a2a414c1e45c47cefcde5
SHA1e5759ba0f2af222c68d4bf6ee988e77d0b468934
SHA25640c31618efd6d6a2e8cdb543c4356ba4d9b7403e15d3ef9efa8ea0ef3b6408e9
SHA512b76fceffe3137ddd54318b48106911cf8c2bf0b8b1b9b3a0b1771dd6494261f2fe2530f8ddb1c2d4a71b76546eb172498eb339990a434011a667057627280570