Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
15c30f03a49...78.zip
windows10-1703-x64
15c30f03a49...78.zip
windows10-2004-x64
1CVE-2023-2...t3.msg
windows10-1703-x64
3CVE-2023-2...t3.msg
windows10-2004-x64
3CVE-2023-2...ie.msg
windows10-1703-x64
3CVE-2023-2...ie.msg
windows10-2004-x64
3CVE-2023-2...l2.msg
windows10-1703-x64
3CVE-2023-2...l2.msg
windows10-2004-x64
3CVE-2023-2...97.msg
windows10-1703-x64
3CVE-2023-2...97.msg
windows10-2004-x64
3CVE-2023-2...st.msg
windows10-1703-x64
3CVE-2023-2...st.msg
windows10-2004-x64
3CVE-2023-2...nt.msg
windows10-1703-x64
3CVE-2023-2...nt.msg
windows10-2004-x64
3CVE-2023-2...st.msg
windows10-1703-x64
3CVE-2023-2...st.msg
windows10-2004-x64
3CVE-2023-2...ay.msg
windows10-1703-x64
3CVE-2023-2...ay.msg
windows10-2004-x64
3CVE-2023-2...ax.msg
windows10-1703-x64
3CVE-2023-2...ax.msg
windows10-2004-x64
3CVE-2023-2...cf.msg
windows10-1703-x64
3CVE-2023-2...cf.msg
windows10-2004-x64
3CVE-2023-2...09.msg
windows10-1703-x64
3CVE-2023-2...09.msg
windows10-2004-x64
3Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2023, 05:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5c30f03a491ee5bde61a0b419faed0e43179c8f5ce9940078fa3f02e55ac7978.zip
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
5c30f03a491ee5bde61a0b419faed0e43179c8f5ce9940078fa3f02e55ac7978.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
CVE-2023-23397/07dd965b6f78dd3cf52542a9386f3421ec6b56c1eb5a8f139a7a67133390f595_test3.msg
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
CVE-2023-23397/07dd965b6f78dd3cf52542a9386f3421ec6b56c1eb5a8f139a7a67133390f595_test3.msg
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
CVE-2023-23397/1e7767eaaa659a1ef8b8e00c0fbb94d0629016c6a92fa5ab1191b91ec83d19c8_test - kopie.msg
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
CVE-2023-23397/1e7767eaaa659a1ef8b8e00c0fbb94d0629016c6a92fa5ab1191b91ec83d19c8_test - kopie.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
CVE-2023-23397/47fee24586cd2858cfff2dd7a4e76dc95eb44c8506791ccc2d59c837786eafe3_appointment_mal2.msg
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
CVE-2023-23397/47fee24586cd2858cfff2dd7a4e76dc95eb44c8506791ccc2d59c837786eafe3_appointment_mal2.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
CVE-2023-23397/6c0087a5cbccb3c776a471774d1df10fe46b0f0eb11db6a32774eb716e1b7909_CVE_2023_23397.msg
Resource
win10-20230220-en
Behavioral task
behavioral10
Sample
CVE-2023-23397/6c0087a5cbccb3c776a471774d1df10fe46b0f0eb11db6a32774eb716e1b7909_CVE_2023_23397.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
CVE-2023-23397/7a029dcbf7c69edc3d234596f669b20b1fd45b20f310668314117403187d9ebb_test.msg
Resource
win10-20230220-en
Behavioral task
behavioral12
Sample
CVE-2023-23397/7a029dcbf7c69edc3d234596f669b20b1fd45b20f310668314117403187d9ebb_test.msg
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
CVE-2023-23397/b33a0eb265d4679a429e9551b76e3ffbd5c4dca39ec50a6af1cda7c49fd14771_appointment.msg
Resource
win10-20230220-en
Behavioral task
behavioral14
Sample
CVE-2023-23397/b33a0eb265d4679a429e9551b76e3ffbd5c4dca39ec50a6af1cda7c49fd14771_appointment.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
CVE-2023-23397/d33b484c55d59490f4a490e3c02d5799fefd900bb5f42fc090c622171281f89d_mytest.msg
Resource
win10-20230220-en
Behavioral task
behavioral16
Sample
CVE-2023-23397/d33b484c55d59490f4a490e3c02d5799fefd900bb5f42fc090c622171281f89d_mytest.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
CVE-2023-23397/eedae202980c05697a21a5c995d43e1905c4b25f8ca2fff0c34036bc4fd321fa_happy_birthday.msg
Resource
win10-20230220-en
Behavioral task
behavioral18
Sample
CVE-2023-23397/eedae202980c05697a21a5c995d43e1905c4b25f8ca2fff0c34036bc4fd321fa_happy_birthday.msg
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
CVE-2023-23397/f46301802feb133b3a036cd020c982bdce7edc63dc6718e42e2756265dee01a7_hax.msg
Resource
win10-20230220-en
Behavioral task
behavioral20
Sample
CVE-2023-23397/f46301802feb133b3a036cd020c982bdce7edc63dc6718e42e2756265dee01a7_hax.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
CVE-2023-23397/real_threats/582442ee950d546744f2fa078adb005853a453e9c7f48c6c770e6322a888c2cf.msg
Resource
win10-20230220-en
Behavioral task
behavioral22
Sample
CVE-2023-23397/real_threats/582442ee950d546744f2fa078adb005853a453e9c7f48c6c770e6322a888c2cf.msg
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
CVE-2023-23397/real_threats/6c0087a5cbccb3c776a471774d1df10fe46b0f0eb11db6a32774eb716e1b7909.msg
Resource
win10-20230220-en
Behavioral task
behavioral24
Sample
CVE-2023-23397/real_threats/6c0087a5cbccb3c776a471774d1df10fe46b0f0eb11db6a32774eb716e1b7909.msg
Resource
win10v2004-20230220-en
General
-
Target
CVE-2023-23397/1e7767eaaa659a1ef8b8e00c0fbb94d0629016c6a92fa5ab1191b91ec83d19c8_test - kopie.msg
-
Size
11KB
-
MD5
b6090ba7db8687637c09daeccb9cdd6a
-
SHA1
a1258a78a75423799e50e36237a75502a74ee11f
-
SHA256
1e7767eaaa659a1ef8b8e00c0fbb94d0629016c6a92fa5ab1191b91ec83d19c8
-
SHA512
2430c37acd84d09b5e0236c49df9c3056c406f959070e9369435330c0b912f29779370af52f6d021b65f42fbd4d0e1d65e5bc7cc56affe84e93f7f2dcb2e6d29
-
SSDEEP
48:rDHLp557WiagDJ6Y/w1NzVgKkkQ2trw6qKtp4hxMdrA5zeR0+mkxObbiMT87urT+:7wY/w18Yasq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4672 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\CVE-2023-23397\1e7767eaaa659a1ef8b8e00c0fbb94d0629016c6a92fa5ab1191b91ec83d19c8_test - kopie.msg"1⤵
- Modifies registry class
PID:4392
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4672
Network
-
Remote address:8.8.8.8:53Request97.97.242.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.4.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request76.38.195.152.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.25.221.88.in-addr.arpaIN PTRResponse154.25.221.88.in-addr.arpaIN PTRa88-221-25-154deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.8.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.3.197.209.in-addr.arpaIN PTRResponse8.3.197.209.in-addr.arpaIN PTRvip0x008map2sslhwcdnnet
-
Remote address:8.8.8.8:53Request210.81.184.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request216.74.101.95.in-addr.arpaIN PTRResponse216.74.101.95.in-addr.arpaIN PTRa95-101-74-216deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request216.74.101.95.in-addr.arpaIN PTRResponse216.74.101.95.in-addr.arpaIN PTRa95-101-74-216deploystaticakamaitechnologiescom
-
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
71 B 145 B 1 1
DNS Request
97.97.242.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.4.107.13.in-addr.arpa
-
72 B 143 B 1 1
DNS Request
76.38.195.152.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
154.25.221.88.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.8.109.52.in-addr.arpa
-
70 B 111 B 1 1
DNS Request
8.3.197.209.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
210.81.184.52.in-addr.arpa
-
144 B 274 B 2 2
DNS Request
216.74.101.95.in-addr.arpa
DNS Request
216.74.101.95.in-addr.arpa