Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
SALES_CONTRACT_DS092094837_127KB_exports_REFERENCE_OEEUE_EXPORT-SUMMARY-14TH-MARCH-2023.xxe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SALES_CONTRACT_DS092094837_127KB_exports_REFERENCE_OEEUE_EXPORT-SUMMARY-14TH-MARCH-2023.xxe
Resource
win10v2004-20230220-en
General
-
Target
SALES_CONTRACT_DS092094837_127KB_exports_REFERENCE_OEEUE_EXPORT-SUMMARY-14TH-MARCH-2023.xxe
-
Size
44KB
-
MD5
efa913c3cac0cd17305d84ee010f27c8
-
SHA1
c724d5b554f094fbb60cd603da4bf91785802ddf
-
SHA256
c2bc72275723e146fb6702d45f181c91e62653c5e59c941698b8f1c5bd2fb82b
-
SHA512
a8a4eb6c8770a7afd01e3b8a6d5a8d25ec5ece5efa53abd763475c96dfd84ea532d9611a02ec0dfa9cc259e3cfec781c39099a65a19a29f5999f7276191ed921
-
SSDEEP
3::
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4756 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SALES_CONTRACT_DS092094837_127KB_exports_REFERENCE_OEEUE_EXPORT-SUMMARY-14TH-MARCH-2023.xxe1⤵
- Modifies registry class
PID:5040
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4756