Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/02/2023, 15:54
230211-tckctahh3s 3Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
11/02/2023, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
youhackerSt.rar
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
youhackerSt.rar
Resource
win10v2004-20220812-en
General
-
Target
youhackerSt.rar
-
Size
2.6MB
-
MD5
33a1d1bbed094e27db66bddeeab4e5dc
-
SHA1
5354677b25e68ad91b389442d4b5b1e65546d84b
-
SHA256
8c4d1f09b5d8a83d7b419b48893b68ad5d99e600622c0fa5c7bff63707bf5db3
-
SHA512
d439a12ce967af3299eabe13b14e55bd2a6d5048b30308a76567b7dd860add8cfd712986da6958824f16fa3c74ac2d07dd5601a4a3a32368cc113933adcfe356
-
SSDEEP
49152:HqDDGnqXwBoZd89O2lUEJcnBDSoyK3Yqjf5FGO2U8MaaR:HYCqABoPEXl3iBDSoypoklMaaR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 776 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 776 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe 776 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 776 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 532 wrote to memory of 528 532 cmd.exe 29 PID 532 wrote to memory of 528 532 cmd.exe 29 PID 532 wrote to memory of 528 532 cmd.exe 29 PID 528 wrote to memory of 776 528 rundll32.exe 30 PID 528 wrote to memory of 776 528 rundll32.exe 30 PID 528 wrote to memory of 776 528 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\youhackerSt.rar1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\youhackerSt.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\youhackerSt.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:776
-
-