Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
12/09/2022, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
FinanceEYEfeeder.zip
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
ThankYou.html
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
background.html
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
background.js
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
content.js
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
manifest.json
Resource
win10-20220901-en
General
-
Target
manifest.json
-
Size
572B
-
MD5
a872d78bc5cab72bbc90b70ab1be8d33
-
SHA1
bfaf133071dfda6ad5fda38c056bbaa681b62792
-
SHA256
b65d1565169a67e43562714c1bf0879544445ef771c8604552d38f2c618ec89e
-
SHA512
6c10928647d824ea013e087d2306449575418431b3ff298f859e866d0e9e1b009f679336fcdaf7d2df5a72938b71f4cf6830eccacd8055498c96fb3018cd580f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5084 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe 5084 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\manifest.json1⤵
- Modifies registry class
PID:4944
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5084