Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2023, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
attachment-3.eml
Resource
win10v2004-20221111-en
Behavioral task
behavioral2
Sample
email-html-1.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
email-plain-1.txt
Resource
win10v2004-20221111-en
General
-
Target
attachment-3.eml
-
Size
499KB
-
MD5
3e1760e4f1beaa5bb7ea9f8ac821ba7b
-
SHA1
8681d248f07d71dae54e22861afbef95cca791cb
-
SHA256
4e841e30fc7af251c5793a164e04e5026e1f822f554d4af78d585f142dd787d7
-
SHA512
6dc8835baeb06afb685f7d44f0dd8fe3cf16236ae795a0ace64ba47aee91ce8a3c918bdcf58555d0d6917ccd3f3dbf718dd9d0318ede79beb4f82f55669403d5
-
SSDEEP
6144:LyFP2/eReiIvwyJQusiqJ2OJVEy6fMRiVHXKvk2yKoS3CmlPT5j2Td7a42:Le1IvW2JMGXQIKosCqATx2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{791FF00C-A6C4-11ED-BF5F-42A3CC74B480} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\attachment-3.eml:OECustomProperty cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5036 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4244 iexplore.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 5036 OpenWith.exe 4244 iexplore.exe 4244 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4244 5036 OpenWith.exe 90 PID 5036 wrote to memory of 4244 5036 OpenWith.exe 90 PID 4244 wrote to memory of 2124 4244 iexplore.exe 92 PID 4244 wrote to memory of 2124 4244 iexplore.exe 92 PID 4244 wrote to memory of 2124 4244 iexplore.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\attachment-3.eml1⤵
- Modifies registry class
- NTFS ADS
PID:4952
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attachment-3.eml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4244 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD53e1760e4f1beaa5bb7ea9f8ac821ba7b
SHA18681d248f07d71dae54e22861afbef95cca791cb
SHA2564e841e30fc7af251c5793a164e04e5026e1f822f554d4af78d585f142dd787d7
SHA5126dc8835baeb06afb685f7d44f0dd8fe3cf16236ae795a0ace64ba47aee91ce8a3c918bdcf58555d0d6917ccd3f3dbf718dd9d0318ede79beb4f82f55669403d5