Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 11:51
Behavioral task
behavioral1
Sample
encrypt.exe
Resource
win10v2004-20230220-en
General
-
Target
encrypt.exe
-
Size
5.7MB
-
MD5
21ac2a16194adb35644571e32c6fcd8f
-
SHA1
8757fe9ff4555f90df7f61855e5762e2c3f1aa21
-
SHA256
bf086bbd8fc8eb68170b745d66afbda7a9a2a9c45cacb4dc7b9b8d1d5e40d9b6
-
SHA512
5d3035454015b30269aa7f7ef7ef45c1da53b347c7eb68424f230f2461ce96f33ca04ef87c58bf1190c9a62df8764017ff6a65ddce3c2876e2acfd6243f604c5
-
SSDEEP
98304:b08mDk/6MgKCAglYYP3YlZ0iSUo+LXl2QXewr6ELoJMjfxzhUu8/xYvAkvl:b09M+GYPolZ0iJLXBeePcMlj40
Malware Config
Signatures
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2260 WINWORD.EXE 2260 WINWORD.EXE 4740 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 mspaint.exe 3392 mspaint.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4740 vlc.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe 4740 vlc.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3392 mspaint.exe 4868 OpenWith.exe 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 2260 WINWORD.EXE 4740 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\encrypt.exe"C:\Users\Admin\AppData\Local\Temp\encrypt.exe"1⤵PID:4544
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\EditHide.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3392
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:3324
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1476
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\GrantCompare.odt"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2260
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ResumeInstall.avi"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD5edf24781f929616eeb56dee54e78fd86
SHA1dadfa44a4f3e532059b08915b1402c0db4b0eb14
SHA2562072a9956f39be03a762164be9532e5586606349e0c1a906ba3d53c2ee2fa5a2
SHA5129fc6f406b8f31cffeea38f876becfd5878368d7f589249f60f85553b8621294168f95eba46b247eb043be6d4d442d2339198da8d1ce6537e794e0203cbdc12fb