Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/03/2023, 17:55
230323-whn93abc2w 323/03/2023, 17:50
230323-we39tabb9w 423/03/2023, 17:45
230323-wb42yahc35 423/03/2023, 17:43
230323-wapkvshc27 323/03/2023, 17:41
230323-v9he6ahc22 1Analysis
-
max time kernel
68s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23/03/2023, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
Solicitar Cotización.rar
Resource
win10-20230220-en
General
-
Target
Solicitar Cotización.rar
-
Size
718KB
-
MD5
8d8f2fc8051dbb1143da9700013bd4d7
-
SHA1
6bc659f9d097cac792f029f28761df88a954d822
-
SHA256
dabb83dc8b5700dcd8458558d945e71145bf83564c58b020d913f7929289a214
-
SHA512
c02dd3377a78671efaaaed7d648625b94aa168931ca85f906682da0f614e26097ac91460b08fa58cfbc07d00b36e61aa0f60e0acdd65d98fdda18f9ffdea187d
-
SSDEEP
12288:EXftIvcf1jC0uYfFZ3ZmMhNRqBck38lxrgx9fkq9upf/ZpOX0xK6xiPu:cfSv+O0uY8MBKAgx1uZOMLN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\.rar OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\.rar\ = "rar_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\rar_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\rar_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\rar_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\rar_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\rar_auto_file\shell OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4144 OpenWith.exe 4868 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4868 7zFM.exe Token: 35 4868 7zFM.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4144 OpenWith.exe 4932 AcroRd32.exe 4932 AcroRd32.exe 4932 AcroRd32.exe 4932 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4932 4144 OpenWith.exe 68 PID 4144 wrote to memory of 4932 4144 OpenWith.exe 68 PID 4144 wrote to memory of 4932 4144 OpenWith.exe 68 PID 4932 wrote to memory of 4752 4932 AcroRd32.exe 71 PID 4932 wrote to memory of 4752 4932 AcroRd32.exe 71 PID 4932 wrote to memory of 4752 4932 AcroRd32.exe 71 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 1208 4752 RdrCEF.exe 72 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73 PID 4752 wrote to memory of 4080 4752 RdrCEF.exe 73
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Solicitar Cotización.rar"1⤵
- Modifies registry class
PID:3664
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Solicitar Cotización.rar"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0DE459600CFD125813E3BD4C6A476918 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=020BA3959A6ACA33EE98B15CBB89D085 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=020BA3959A6ACA33EE98B15CBB89D085 --renderer-client-id=2 --mojo-platform-channel-handle=1632 --allow-no-sandbox-job /prefetch:14⤵PID:4080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DEE7B28CF1C9F51BE1AD4D9E89F62704 --mojo-platform-channel-handle=2208 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3772
-
-
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3272