Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2023, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
DOCX_EMITIDO_CA72689.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DOCX_EMITIDO_CA72689.rar
Resource
win10v2004-20230220-en
General
-
Target
DOCX_EMITIDO_CA72689.rar
-
Size
761KB
-
MD5
fefa57db40b0bbd3cebf7d77d96f2564
-
SHA1
f83b0cd9a97d05fd30ea4a5d76bb032059c0e607
-
SHA256
49f824651fa3c88590eb60449fd376acb1430bb73143ccb4b09c95caf4ffe6d6
-
SHA512
3c10bdc1c2cd59bb6d6f9260ec691592662f956fe607148d6f86e9270095ceba7c8d5683af10ca4041ec0bcb9c78a1d85b672068db08a3cfba544ac12da3c23a
-
SSDEEP
12288:wPeB0U/asyqZHX91yCt/n2xZ9jKY5bZzc2EOiTo+DAk409NXdm087fY0oOe9VxzO:wPeB0USs1HX91X2XdZ9EOEoF09KrY0Tn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 584 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 584 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe 584 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 584 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1360 wrote to memory of 860 1360 cmd.exe 29 PID 1360 wrote to memory of 860 1360 cmd.exe 29 PID 1360 wrote to memory of 860 1360 cmd.exe 29 PID 860 wrote to memory of 584 860 rundll32.exe 30 PID 860 wrote to memory of 584 860 rundll32.exe 30 PID 860 wrote to memory of 584 860 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DOCX_EMITIDO_CA72689.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DOCX_EMITIDO_CA72689.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\DOCX_EMITIDO_CA72689.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:584
-
-