Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20240226-en
General
-
Target
PHOTO-DEVOCHKA.exe
-
Size
180KB
-
MD5
63f222fa3dec54c99fa71bfbef798cab
-
SHA1
a6aa7dca45be30f5f1f0a2c0cf24c15637fe33f4
-
SHA256
47bfc569cb27c9596d81d144a9af37d5f378dcdaf73d6c416b86362739354b8f
-
SHA512
75c8086cd6dce1433e426f8f65d893130847b0ded224a4c6f26ebc6ee1ef9a33299da4f8902067697717b3cd8e4a855018929fb8d562c9581e79d023ae46e2df
-
SSDEEP
3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0h+tzYOuIPA:1bXE9OiTGfhEClq9dYpII
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 5332 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation PHOTO-DEVOCHKA.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\poztfiz\popizdota.dot PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\333\why_do_you_cry_willy.bat PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\poztfiz\____000000_hello__.vbs PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\poztfiz\_hello______22222_______.vbs PHOTO-DEVOCHKA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings PHOTO-DEVOCHKA.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3472 wrote to memory of 388 3472 PHOTO-DEVOCHKA.exe 91 PID 3472 wrote to memory of 388 3472 PHOTO-DEVOCHKA.exe 91 PID 3472 wrote to memory of 388 3472 PHOTO-DEVOCHKA.exe 91 PID 3472 wrote to memory of 3088 3472 PHOTO-DEVOCHKA.exe 93 PID 3472 wrote to memory of 3088 3472 PHOTO-DEVOCHKA.exe 93 PID 3472 wrote to memory of 3088 3472 PHOTO-DEVOCHKA.exe 93 PID 3472 wrote to memory of 5332 3472 PHOTO-DEVOCHKA.exe 94 PID 3472 wrote to memory of 5332 3472 PHOTO-DEVOCHKA.exe 94 PID 3472 wrote to memory of 5332 3472 PHOTO-DEVOCHKA.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\333\why_do_you_cry_willy.bat" "2⤵
- Drops file in Drivers directory
PID:388
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\poztfiz\____000000_hello__.vbs"2⤵
- Drops file in Drivers directory
PID:3088
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\poztfiz\_hello______22222_______.vbs"2⤵
- Blocklisted process makes network request
PID:5332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD556a64e3d2dabea79062ebd37c2695b87
SHA1d3a7b4e9e3493c0c46bddb3973573511fc314ff9
SHA25607ba63c69713fa2e4467e82eedc9c5eafd795ec3b85f1f38a9d3d4669cb4fba9
SHA512260e82f73839361cc59a40c35ade0658d9ea22dd7b9af1a2937206bab77729ed9776e65765f521ee69cb6dde61d1dd8f0ba645ddc82440625f93b11c96928e7b
-
Filesize
895B
MD586ec234776348de7a66694604c483902
SHA1761269b17829cd99955ca44b9d198d26b3532a7e
SHA256b04079e6d07e7788fb3ae4aade8eb6ea11de6e8582e724cb349be30551a0f5bc
SHA5126dc3f64dd4194eb635a8e791599de7bcf52ab275b46efac9c1c90b28b9669adc8f552680dee6cafb5ebe9af1f5f42f0c31159472dfae8b0e879d17b9a05bc5fa
-
Filesize
611B
MD549386cb3be62579eaa9d21cd8f528c7d
SHA1c2f47fe4e27c663a62190ab454434a3b21070597
SHA2567838e77610ed9f0affd067cd57c610ee4af33411b286b3a24ad60f18135d6289
SHA51223d6cdd86d6c2767e43b8cc79814e6663f376c017694ecc16f971fac140650e02b11a45f247ac302d70489ea9918a365a589f45025581ebc2b9a73b120fb34d8
-
Filesize
34B
MD5aa5511a167a67e429a9fdf3ac25bce0e
SHA18ac961be922cdc3314ed342e809d68637e9ea1f2
SHA256bcf768f1b7db9992ed293fee0d986033c0ed203ad7698cc3f0eec8faad6a4665
SHA512736021521ab3062dd0b748fe989b942c52e2978e7d7313d66684518c4209a8816ccb7cd0229306c1f4fae1cac2c4d107fff52c9d027d4f04d0d4cb736ca53a10
-
Filesize
1KB
MD5c0805e6fff9d30c65b91bc9284beac8e
SHA145456e27d6632159ed7e4403caa1a16721c3b603
SHA25653f25ec3705be321e5d7c17acc6ea1aba6aae01e99223f97d97bcf288c5a8228
SHA51234648a026528d9746f73d01f7600bf947fdee00ddf8525cb89338ebd9b51789f968a79b4c1671eeb96ac83f21788167980835cae8c0f86a550ff95bddfa3c2c3