Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2022, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
Don't forget to pay the tax within 2 days!.eml
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
Barra_2122f2d4-740f-49ea-a4ba-47278b732cf7.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
Logo_CAMPERO_6d51b5b5-ba21-42a3-a9f1-215ceb1330db.jpg
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
email-html-1.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
logotipoCMIparausoonline[1]_63a40cf3-d8ec-4448-9bd7-95e668b2e305.jpg
Resource
win10v2004-20220812-en
General
-
Target
Don't forget to pay the tax within 2 days!.eml
-
Size
58KB
-
MD5
849dec11c720d60ffcb8ecf40db55cf7
-
SHA1
b4f91d04b64348eeb15a4f31baaabf58f7fa9509
-
SHA256
8ad43923fb3cd531e3b73958737e9939f75b15ecffd39e6e8ec064c263179011
-
SHA512
0a0fb29d57ce8223e07f3cdb24e58217e5914a1795b5f9b7070889094c996477818646e6651a05c837f530b193fd27992fb93437ba0fe8c7a7bdf9d38452dd51
-
SSDEEP
768:J2TX7K3JNPcTo0WgJ1vuYQMcy9P60aJFCOX2ASq3WGa+SQzrkdl:J2TXu3JNx+1vxcy9y00COGAJ3W3+ScQT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Don't forget to pay the tax within 2 days!.eml:OECustomProperty cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3196 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Don't forget to pay the tax within 2 days!.eml"1⤵
- Modifies registry class
- NTFS ADS
PID:4632
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3196