Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 11:12
Behavioral task
behavioral1
Sample
902d3e298d0afaexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
902d3e298d0afaexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
902d3e298d0afaexeexeexeex.exe
-
Size
73KB
-
MD5
902d3e298d0afa25ef3a46720fa0f15a
-
SHA1
8a4d107fed4a16e97e355097bd5ed9bcdd710bdd
-
SHA256
d643955488941c2ff39fe6ae12f582b36d68220d533702e016609f3f6b1533fe
-
SHA512
8f542f81bddb2ccf3220508b487f3a5a8dafa55a76bb6c453d4c559a6d91faddb930fd66384d54b4f8510aa543becf26550a32f60f595da5ac003775a1071dbe
-
SSDEEP
1536:sgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:sMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qulpqshllnt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\902d3e298d0afaexeexeexeex.exe" 902d3e298d0afaexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 902d3e298d0afaexeexeexeex.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\L: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\N: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\P: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\S: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\H: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\J: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\K: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\Q: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\A: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\T: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\X: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\Z: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\G: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\E: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\M: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\O: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\R: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\U: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\V: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\W: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\B: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\Y: 902d3e298d0afaexeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 902d3e298d0afaexeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 902d3e298d0afaexeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 902d3e298d0afaexeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3980 902d3e298d0afaexeexeexeex.exe 3980 902d3e298d0afaexeexeexeex.exe 3980 902d3e298d0afaexeexeexeex.exe 3980 902d3e298d0afaexeexeexeex.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3980 wrote to memory of 2328 3980 902d3e298d0afaexeexeexeex.exe 84 PID 3980 wrote to memory of 2328 3980 902d3e298d0afaexeexeexeex.exe 84 PID 3980 wrote to memory of 2328 3980 902d3e298d0afaexeexeexeex.exe 84 PID 3980 wrote to memory of 1348 3980 902d3e298d0afaexeexeexeex.exe 86 PID 3980 wrote to memory of 1348 3980 902d3e298d0afaexeexeexeex.exe 86 PID 3980 wrote to memory of 1348 3980 902d3e298d0afaexeexeexeex.exe 86 PID 3980 wrote to memory of 2868 3980 902d3e298d0afaexeexeexeex.exe 90 PID 3980 wrote to memory of 2868 3980 902d3e298d0afaexeexeexeex.exe 90 PID 3980 wrote to memory of 2868 3980 902d3e298d0afaexeexeexeex.exe 90 PID 3980 wrote to memory of 3512 3980 902d3e298d0afaexeexeexeex.exe 93 PID 3980 wrote to memory of 3512 3980 902d3e298d0afaexeexeexeex.exe 93 PID 3980 wrote to memory of 3512 3980 902d3e298d0afaexeexeexeex.exe 93 PID 3980 wrote to memory of 4904 3980 902d3e298d0afaexeexeexeex.exe 95 PID 3980 wrote to memory of 4904 3980 902d3e298d0afaexeexeexeex.exe 95 PID 3980 wrote to memory of 4904 3980 902d3e298d0afaexeexeexeex.exe 95 PID 3980 wrote to memory of 4260 3980 902d3e298d0afaexeexeexeex.exe 97 PID 3980 wrote to memory of 4260 3980 902d3e298d0afaexeexeexeex.exe 97 PID 3980 wrote to memory of 4260 3980 902d3e298d0afaexeexeexeex.exe 97 PID 3980 wrote to memory of 3068 3980 902d3e298d0afaexeexeexeex.exe 99 PID 3980 wrote to memory of 3068 3980 902d3e298d0afaexeexeexeex.exe 99 PID 3980 wrote to memory of 3068 3980 902d3e298d0afaexeexeexeex.exe 99 PID 3980 wrote to memory of 3860 3980 902d3e298d0afaexeexeexeex.exe 101 PID 3980 wrote to memory of 3860 3980 902d3e298d0afaexeexeexeex.exe 101 PID 3980 wrote to memory of 3860 3980 902d3e298d0afaexeexeexeex.exe 101 PID 3980 wrote to memory of 896 3980 902d3e298d0afaexeexeexeex.exe 103 PID 3980 wrote to memory of 896 3980 902d3e298d0afaexeexeexeex.exe 103 PID 3980 wrote to memory of 896 3980 902d3e298d0afaexeexeexeex.exe 103 PID 3980 wrote to memory of 4148 3980 902d3e298d0afaexeexeexeex.exe 105 PID 3980 wrote to memory of 4148 3980 902d3e298d0afaexeexeexeex.exe 105 PID 3980 wrote to memory of 4148 3980 902d3e298d0afaexeexeexeex.exe 105 PID 3980 wrote to memory of 4276 3980 902d3e298d0afaexeexeexeex.exe 107 PID 3980 wrote to memory of 4276 3980 902d3e298d0afaexeexeexeex.exe 107 PID 3980 wrote to memory of 4276 3980 902d3e298d0afaexeexeexeex.exe 107 PID 3980 wrote to memory of 1688 3980 902d3e298d0afaexeexeexeex.exe 109 PID 3980 wrote to memory of 1688 3980 902d3e298d0afaexeexeexeex.exe 109 PID 3980 wrote to memory of 1688 3980 902d3e298d0afaexeexeexeex.exe 109 PID 3980 wrote to memory of 4012 3980 902d3e298d0afaexeexeexeex.exe 111 PID 3980 wrote to memory of 4012 3980 902d3e298d0afaexeexeexeex.exe 111 PID 3980 wrote to memory of 4012 3980 902d3e298d0afaexeexeexeex.exe 111 PID 3980 wrote to memory of 4524 3980 902d3e298d0afaexeexeexeex.exe 113 PID 3980 wrote to memory of 4524 3980 902d3e298d0afaexeexeexeex.exe 113 PID 3980 wrote to memory of 4524 3980 902d3e298d0afaexeexeexeex.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\902d3e298d0afaexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\902d3e298d0afaexeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1348
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2868
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3512
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4904
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4260
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3860
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:896
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4148
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4524
-