Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/10/2022, 05:26
221013-f44zmsagfm 1013/10/2022, 05:21
221013-f2ft2abae7 105/07/2022, 20:58
220705-zsep6achfq 10Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05/07/2022, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
Project requirements.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Project requirements.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
prjct.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
prjct.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
prjct.rsp
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
prjct.rsp
Resource
win10v2004-20220414-en
General
-
Target
prjct.rsp
-
Size
16B
-
MD5
4080b43f784d55b529bfdaa037f50789
-
SHA1
9bcde1ef9a7e3fb602572562ca11c24ae64010c6
-
SHA256
9d7cefe910724cecaefe05a417129eaf537cab95d198cc5b1f0a1d822e810988
-
SHA512
fd5a879707c13e4a0c324495f332a8277754f2c9af8b6470b976dd7a5a81858047035071e1c7abf4408729817afb6b91092b15b3297252fab04f6fd594ae35b0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\rsp_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\rsp_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\.rsp rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\.rsp\ = "rsp_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\rsp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\rsp_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\rsp_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\rsp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 684 AcroRd32.exe 684 AcroRd32.exe 684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2012 1600 cmd.exe 28 PID 1600 wrote to memory of 2012 1600 cmd.exe 28 PID 1600 wrote to memory of 2012 1600 cmd.exe 28 PID 2012 wrote to memory of 684 2012 rundll32.exe 29 PID 2012 wrote to memory of 684 2012 rundll32.exe 29 PID 2012 wrote to memory of 684 2012 rundll32.exe 29 PID 2012 wrote to memory of 684 2012 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\prjct.rsp1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\prjct.rsp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\prjct.rsp"3⤵
- Suspicious use of SetWindowsHookEx
PID:684
-
-