Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20231222-en
General
-
Target
PHOTO-DEVOCHKA.exe
-
Size
180KB
-
MD5
02c11f1ec6c372847460c9afd76390dd
-
SHA1
032ee4e4369c55489abc2971a8b2c295e368b780
-
SHA256
4c9f213973c5144faafaad68cb94b809519752309208b998bb49621f02d8eabf
-
SHA512
1910f7447c783469c0853629500de9335717cb19e083a1502bee7031c26a3738535bfd5d74b7dafa1034a6b8079fe0482aba165f40598b410c5a8a8304a0d2fa
-
SSDEEP
3072:VBAp5XhKpN4eOyVTGfhEClj8jTk+0hvA8DN5TcKM4xoawC3Tw:wbXE9OiTGfhEClq92A8DP1Mvabk
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 3444 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation PHOTO-DEVOCHKA.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\conservationistsandother.vbs PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\Elaeioleiferandhemar.ipa PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\Crudepalmilutures.bat PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\yellowishfattyilobtained.vbs PHOTO-DEVOCHKA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings PHOTO-DEVOCHKA.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1456 4536 PHOTO-DEVOCHKA.exe 76 PID 4536 wrote to memory of 1456 4536 PHOTO-DEVOCHKA.exe 76 PID 4536 wrote to memory of 1456 4536 PHOTO-DEVOCHKA.exe 76 PID 4536 wrote to memory of 2328 4536 PHOTO-DEVOCHKA.exe 74 PID 4536 wrote to memory of 2328 4536 PHOTO-DEVOCHKA.exe 74 PID 4536 wrote to memory of 2328 4536 PHOTO-DEVOCHKA.exe 74 PID 4536 wrote to memory of 3444 4536 PHOTO-DEVOCHKA.exe 75 PID 4536 wrote to memory of 3444 4536 PHOTO-DEVOCHKA.exe 75 PID 4536 wrote to memory of 3444 4536 PHOTO-DEVOCHKA.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\yellowishfattyilobtained.vbs"2⤵
- Drops file in Drivers directory
PID:2328
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\conservationistsandother.vbs"2⤵
- Blocklisted process makes network request
PID:3444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\Crudepalmilutures.bat" "2⤵
- Drops file in Drivers directory
PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\Crudepalmilutures.bat
Filesize715B
MD503eba18623b9331f83578dec7930c482
SHA127a9f2ce863b7dd6e897e6daec56562433f1e0fd
SHA25641f1a182339522ac984b1276a4fdc96acc48e5d16282fb8fb8f92fc956ffb9cb
SHA512d8e00b2337739478521fe61e557beecbc02ecce7923ea435cf3432652f5cbe2c699751a2c0178c23c096797e9d067c19349290badbb9824a6ad8348c0ec01129
-
C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\Elaeioleiferandhemar.ipa
Filesize71B
MD59b3268dccd0bdadd9b1befd0c76798a1
SHA1cc47c18947b39a560f6501c8801bdd44b0bafa2f
SHA256713453321d24315e307a5c1f93f56f5dbd2e01d056d7b94a2a27726c7b3abf34
SHA512c2927d27eabd4822d4dd2fb9be06b714fc40a564b1896e44ae27f392654953c1c252bd2bb2d6467c821e739f8d2968c537b267a30197a7f82857f8a8f3c06e75
-
C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\conservationistsandother.vbs
Filesize500B
MD59fbb0531c4af46af59305936a6ec66be
SHA181ef1472a34f9c90738cfdb6cd8be71d6518de4e
SHA2565c41e584453cfe13a7b3d2116fb0702a7e3431132ab275c9d2c3aab6319b421a
SHA512491c5fc06c1468453c2e9998ddb9da467b1147ff035e679ce30a05b2511891d25cb0d856bb858dc1089523ce566c2a7bcf02acb03a00e2d1e02d7dc13f3ca849
-
C:\Program Files (x86)\primarily the African odfgm\Palm oil is an edible vegdfg\palm\yellowishfattyilobtained.vbs
Filesize645B
MD5ef69ef221195bc42cc1ccf574c7e713f
SHA1d0d6fe3ef8060c5a7911029e32a052218d1ea2a5
SHA256b5a51b1c65448becfc32b59be5ea7e885a085fe4cfad3c1a9494a6af16417a8e
SHA512f0e2df84bd3e4e7db8c5e22d374d97b727311f7295504cba2353e1844e9a7216eb7165b1b2c824a7663d48f108491de51fa6a74514fafd50af940fe8099953e8
-
Filesize
1KB
MD5f171786ec060c21808b83e91b5a748ba
SHA149627304d348ff56bf5c790696297e76a2240e28
SHA256ad3360381bb13f1918e7afd07650f1644a5ce8a222633dfbf272a1e76417f162
SHA512c292ada6854542a6bba165b4362b81008c5b8035e60bab2c3989db7c8032139f91296977f6e8e37c70e73436b1fe653f1dbba2398ead88fadb795f10a1f0716a
-
Filesize
1KB
MD5b39b3c6e849da2757406331d12729746
SHA13974776133b06047b01a16c818024e4d363ef1df
SHA2568f7a294349bd802db8991a3246f0d3153ff993e593249398f0b1342f97a49487
SHA512b995db81214a871c92cac59a0e4a569be016c35bd6a571d7f1bbbcc0535ffb99f480e04fdff8af00bb7a172efe104d138c6153c2b20d8833c11209effb161e58