Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/10/2022, 17:13
221010-vrjkhacggj 1003/06/2022, 21:56
220603-1tra1seah3 103/06/2022, 21:55
220603-1swt4sabgp 103/06/2022, 21:38
220603-1hbq7adhf4 1003/06/2022, 21:28
220603-1brttsdha7 10Analysis
-
max time kernel
370s -
max time network
399s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
03/06/2022, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
oFWkRTFwjm.zip
Resource
win10-20220414-en
Behavioral task
behavioral2
Sample
oFWkRTFwjm.zip
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
document.iso
Resource
win10-20220414-en
Behavioral task
behavioral4
Sample
document.iso
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
documents.lnk
Resource
win10-20220414-en
Behavioral task
behavioral6
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
lipes.dll
Resource
win10-20220414-en
Behavioral task
behavioral8
Sample
lipes.dll
Resource
win10v2004-20220414-en
General
-
Target
document.iso
-
Size
2.9MB
-
MD5
f85b9913ed3c1b37defe3a83c9107ae9
-
SHA1
bd8732ac09eb363102cf8e3060869e7799c6afb5
-
SHA256
6daa6a247d6989fe4723a1d0868ed4abb6dfaadf09d1177fa23856b841e00644
-
SHA512
eed53b0bfc761259edb05ebcbb53c8e603ccdba33888a550671d60a9c2747f543b0d5c0a9d8cbc30bea7d20b872b72be1c621a5f58a18dae9dfe4eb27a79522a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3580 cmd.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\document.iso1⤵
- Modifies registry class
- Suspicious behavior: LoadsDriver
PID:3580
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3148