Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2023, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
AIDA64.rar
Resource
win7-20220812-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
AIDA64.rar
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
AIDA64.rar
-
Size
12.0MB
-
MD5
5d2f0464db1a5fb3bd7c22e6d66d0ba5
-
SHA1
4cc58c0b42d62e9ea8ea85c2c556b48c271216d7
-
SHA256
4f0c6aed9b8128a42f877c1e3449691c0693626a8bc280d7b88dec69b75e077e
-
SHA512
21263259f25e2996dd96c73509a4e0c19c3044a34fdc2c53698e6b43a06b892bc3cab9437de10b929eff9f3411d7e72a7d91de0ed7378dbbe04c33c79157449d
-
SSDEEP
393216:4oI445DfU49EhG/xjg1e8aTR3uosAlQJvveWaVu1CURs0:fUUeEM5Ye5R3hsNJt/Rs0
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.rar OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2060 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2060 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe 2060 vlc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 2060 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5092 wrote to memory of 2060 5092 OpenWith.exe 86 PID 5092 wrote to memory of 2060 5092 OpenWith.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AIDA64.rar1⤵
- Modifies registry class
PID:952
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\AIDA64.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2060
-