Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 15:20
Behavioral task
behavioral1
Sample
0x00080000000122e6-1069.exe
Resource
win7-20230220-en
General
-
Target
0x00080000000122e6-1069.exe
-
Size
226KB
-
MD5
d6e9b7a43836a7de3b47450c77eb2e12
-
SHA1
22b24298231f07c05fe057f2c5ee0e973260b6b4
-
SHA256
7c9a2a9bc7a70c76bee74d184c9d8928c3e5a709ea577f21e146d007da52365f
-
SHA512
0adb295e7c7086678eb9bedc2a541d00b5a815ffffa3cc9aeaf771fa985f34ba5380a9b2ee98342f8a48240757b2568dcf2c7c5986581a814ce92e8893acdc08
-
SSDEEP
6144:4rzyIG8IcCnD5A2QdY8rWpau1CYUqfhYdMBg:KmlLnD5qdY8Fu1CYUehrBg
Malware Config
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation metafor.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 0x00080000000122e6-1069.exe -
Executes dropped EXE 3 IoCs
pid Process 1436 metafor.exe 3612 metafor.exe 4908 metafor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1332 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1436 3344 0x00080000000122e6-1069.exe 85 PID 3344 wrote to memory of 1436 3344 0x00080000000122e6-1069.exe 85 PID 3344 wrote to memory of 1436 3344 0x00080000000122e6-1069.exe 85 PID 1436 wrote to memory of 1332 1436 metafor.exe 86 PID 1436 wrote to memory of 1332 1436 metafor.exe 86 PID 1436 wrote to memory of 1332 1436 metafor.exe 86 PID 1436 wrote to memory of 4416 1436 metafor.exe 88 PID 1436 wrote to memory of 4416 1436 metafor.exe 88 PID 1436 wrote to memory of 4416 1436 metafor.exe 88 PID 4416 wrote to memory of 2980 4416 cmd.exe 90 PID 4416 wrote to memory of 2980 4416 cmd.exe 90 PID 4416 wrote to memory of 2980 4416 cmd.exe 90 PID 4416 wrote to memory of 3052 4416 cmd.exe 91 PID 4416 wrote to memory of 3052 4416 cmd.exe 91 PID 4416 wrote to memory of 3052 4416 cmd.exe 91 PID 4416 wrote to memory of 1296 4416 cmd.exe 92 PID 4416 wrote to memory of 1296 4416 cmd.exe 92 PID 4416 wrote to memory of 1296 4416 cmd.exe 92 PID 4416 wrote to memory of 728 4416 cmd.exe 93 PID 4416 wrote to memory of 728 4416 cmd.exe 93 PID 4416 wrote to memory of 728 4416 cmd.exe 93 PID 4416 wrote to memory of 4356 4416 cmd.exe 94 PID 4416 wrote to memory of 4356 4416 cmd.exe 94 PID 4416 wrote to memory of 4356 4416 cmd.exe 94 PID 4416 wrote to memory of 4128 4416 cmd.exe 95 PID 4416 wrote to memory of 4128 4416 cmd.exe 95 PID 4416 wrote to memory of 4128 4416 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00080000000122e6-1069.exe"C:\Users\Admin\AppData\Local\Temp\0x00080000000122e6-1069.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F3⤵
- Creates scheduled task(s)
PID:1332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:N"4⤵PID:3052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:R" /E4⤵PID:1296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:N"4⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:R" /E4⤵PID:4128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe1⤵
- Executes dropped EXE
PID:3612
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe1⤵
- Executes dropped EXE
PID:4908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5d6e9b7a43836a7de3b47450c77eb2e12
SHA122b24298231f07c05fe057f2c5ee0e973260b6b4
SHA2567c9a2a9bc7a70c76bee74d184c9d8928c3e5a709ea577f21e146d007da52365f
SHA5120adb295e7c7086678eb9bedc2a541d00b5a815ffffa3cc9aeaf771fa985f34ba5380a9b2ee98342f8a48240757b2568dcf2c7c5986581a814ce92e8893acdc08
-
Filesize
226KB
MD5d6e9b7a43836a7de3b47450c77eb2e12
SHA122b24298231f07c05fe057f2c5ee0e973260b6b4
SHA2567c9a2a9bc7a70c76bee74d184c9d8928c3e5a709ea577f21e146d007da52365f
SHA5120adb295e7c7086678eb9bedc2a541d00b5a815ffffa3cc9aeaf771fa985f34ba5380a9b2ee98342f8a48240757b2568dcf2c7c5986581a814ce92e8893acdc08
-
Filesize
226KB
MD5d6e9b7a43836a7de3b47450c77eb2e12
SHA122b24298231f07c05fe057f2c5ee0e973260b6b4
SHA2567c9a2a9bc7a70c76bee74d184c9d8928c3e5a709ea577f21e146d007da52365f
SHA5120adb295e7c7086678eb9bedc2a541d00b5a815ffffa3cc9aeaf771fa985f34ba5380a9b2ee98342f8a48240757b2568dcf2c7c5986581a814ce92e8893acdc08
-
Filesize
226KB
MD5d6e9b7a43836a7de3b47450c77eb2e12
SHA122b24298231f07c05fe057f2c5ee0e973260b6b4
SHA2567c9a2a9bc7a70c76bee74d184c9d8928c3e5a709ea577f21e146d007da52365f
SHA5120adb295e7c7086678eb9bedc2a541d00b5a815ffffa3cc9aeaf771fa985f34ba5380a9b2ee98342f8a48240757b2568dcf2c7c5986581a814ce92e8893acdc08
-
Filesize
226KB
MD5d6e9b7a43836a7de3b47450c77eb2e12
SHA122b24298231f07c05fe057f2c5ee0e973260b6b4
SHA2567c9a2a9bc7a70c76bee74d184c9d8928c3e5a709ea577f21e146d007da52365f
SHA5120adb295e7c7086678eb9bedc2a541d00b5a815ffffa3cc9aeaf771fa985f34ba5380a9b2ee98342f8a48240757b2568dcf2c7c5986581a814ce92e8893acdc08