Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    57s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2022, 14:43

General

  • Target

    forbiden.php

  • Size

    175KB

  • MD5

    5ac7f606f9ce06bf1a31f5bf6e38a0c3

  • SHA1

    8c37808c607beb16ff9780fb8066060552a2b06f

  • SHA256

    95000d76ecb07a4e2258fa23f96fb573dba652d4222c7b5b71de3bb9f3789913

  • SHA512

    65ca1a5baec17b839da4f5fe8f6e048a02b0007b36722a6e33ab915c7b5031211d7569a0f45164d069193ba78409946b524c0b368eb7c75f9dc03e53c8f1f363

  • SSDEEP

    3072:8cnNvEQnoYYLqUX10OG3aRDZ8IZZqpWxunF9Yzff1ktethFzCUPfWiyhPEilI/u:lo1qM10OGKFZmW4Yzff1zgUnWiyai2W

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\forbiden.php
    1⤵
    • Modifies registry class
    PID:4736
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\forbiden.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5000 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a042902dbdea921b2f46c7d0198c9ccd

    SHA1

    c8deb19ba5d251f44c2bbcbf52340123bc9f1da8

    SHA256

    abbd85d1c316255702f6a692c549a64ede98dc77b2db39c562ffcd34002345b7

    SHA512

    9a4863916f16fa2636cfdb46d7403b0d263db0b155c13264c9f95bcf87122fe5659edae41f2fb6cd7a440e0073c1a66fc12e65b1f9a6d7de3bb6825e0e6c5d9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    2c0d730699e2e9beef95f95c90c24723

    SHA1

    2a846ef967a158ad64437bb6f70ebb71a7bfbaa4

    SHA256

    529418fa251acf3f2775f71e78cc4f8da3a6249b4342f91b68d27d749c888dfa

    SHA512

    710827ee96c7fd9bb36d4ec3748c1561db2ebefde5be72de141e378ef0c0f516f0967a17cbd2a397f56a9bdd4ca1adfa787ebfb516be8c50e42e3d5f3c06bb44