Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 04:21
Behavioral task
behavioral1
Sample
92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe
Resource
win10v2004-20250217-en
General
-
Target
92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe
-
Size
279KB
-
MD5
77e1ab3e5cb8972b0ae1561eb86e2600
-
SHA1
665b137333c596ac157e7db484c6a0ac0b4de2fb
-
SHA256
92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35
-
SHA512
2e1017b7a0bed5ef38e44503abe13bba5b1c40575be46ef44bf82fa9d04bc577e6ca0ae4f9c40ec97322c0692f48c977a3ab976d032aada6c43ab118c9df9f5d
-
SSDEEP
6144:BnofiqN0B0doCbxIJRIgnxDsH4ReSzboEn1EdBLkKztk:BnoKqN02dERIOD0mTzbznGXve
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_HELP_HELP_HELP_PZ2ZY4DK.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (592) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp1400.bmp" 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 -
resource yara_rule behavioral2/memory/2860-0-0x0000000000700000-0x000000000072B000-memory.dmp upx behavioral2/memory/2860-2-0x0000000000700000-0x000000000072B000-memory.dmp upx behavioral2/memory/2860-5-0x0000000000700000-0x000000000072B000-memory.dmp upx -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\powerpoint 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\word 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files\ 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\excel 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft\office 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\onenote 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\the bat! 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\ 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft sql server 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft\excel 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\outlook 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\thunderbird 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\steam 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft\word 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\office 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\bitcoin 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\ 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3584 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 5004 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3584 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe Token: SeCreatePagefilePrivilege 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe Token: 33 1768 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1768 AUDIODG.EXE Token: SeDebugPrivilege 5004 taskkill.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 2860 wrote to memory of 3988 2860 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 96 PID 3988 wrote to memory of 4888 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 103 PID 3988 wrote to memory of 4888 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 103 PID 3988 wrote to memory of 4888 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 103 PID 3988 wrote to memory of 1576 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 111 PID 3988 wrote to memory of 1576 3988 92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe 111 PID 1576 wrote to memory of 5004 1576 cmd.exe 113 PID 1576 wrote to memory of 5004 1576 cmd.exe 113 PID 1576 wrote to memory of 3584 1576 cmd.exe 114 PID 1576 wrote to memory of 3584 1576 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe"C:\Users\Admin\AppData\Local\Temp\92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe"C:\Users\Admin\AppData\Local\Temp\92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe"2⤵
- Checks computer location settings
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_HELP_HELP_HELP_UYYY.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\taskkill.exetaskkill /f /im "92b0ec3335c42208b583947a66ec163f120778835f4a6d171162b5beaf4fbf35N.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3584
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x420 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5f3011f542cb6287d42a910900ebd7886
SHA1cc185049a2386098eb3968e292fb630cbb82bae2
SHA2566b6f02641b5384fddfafb51100dc5f69342df5902721c5cf2a416a537a3408b7
SHA5120c8d8e36ce4aa32da2221481f19955372714418583e3e1d290fe370e9fab0380642f555aca606ec4dfe4dc98a5f8037262a1f9e8d59d56654717138938f9922b
-
Filesize
151KB
MD5248c5ece8dd94f7773b451e60b399704
SHA1777937caa65b88dffff8137db8eae33983853d7c
SHA256c0655fe852416ccaf503c9774c062a18c5537dad7f3b62557c46ae0e0b86dd6c
SHA5120a889c2b380033c89c671c5249542fd528cfc2aec79654a02b11bce0b8e8f434796edce4b2074ccca865cc539c5be9550e58e7b7e2aa20450dfb11966a488104