Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
Hope this helps.msg
Resource
win7-20220812-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Hope this helps.msg
Resource
win10v2004-20220812-en
5 signatures
150 seconds
General
-
Target
Hope this helps.msg
-
Size
112KB
-
MD5
eae521a34d2cb73cdbf775dc9c1d1852
-
SHA1
3b46639337558def49b5f28eb8e20f80b01839f0
-
SHA256
001eddb14375b03222c6f3c569e1d638177cf722115e7a67b436b367e9f10092
-
SHA512
9cbbb29f6cdf71aaad6bd51977346546da3e253683efb173d606a69bd17b6997b6bc69ee23805362d0799ca33f5362170872ec65574038a0f7cbc028e0800be2
-
SSDEEP
3072:kOB8RKHmja06y74rzjAjUCM8FAHosi0iOsCi:kuoKG206y74rzjAKrosds
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\msg_auto_file\shell\open\command\ = "\"%ProgramFiles%\\Windows NT\\Accessories\\WORDPAD.EXE\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.msg OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.msg\ = "msg_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\msg_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\msg_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\msg_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\msg_auto_file OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5032 OpenWith.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 5032 OpenWith.exe 2288 WORDPAD.EXE 2288 WORDPAD.EXE 2288 WORDPAD.EXE 2288 WORDPAD.EXE 2288 WORDPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5032 wrote to memory of 2288 5032 OpenWith.exe 95 PID 5032 wrote to memory of 2288 5032 OpenWith.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Hope this helps.msg"1⤵
- Modifies registry class
PID:4532
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE"C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\Hope this helps.msg"2⤵
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2268