Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/04/2023, 17:49
230413-wehywadb43 313/04/2023, 17:47
230413-wcz5daed4x 313/04/2023, 16:35
230413-t3tn6sea21 8Analysis
-
max time kernel
67s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
images.jpg
Resource
win10v2004-20230221-en
5 signatures
1800 seconds
General
-
Target
images.jpg
-
Size
5KB
-
MD5
66a3b72879baa39d00a1a837ef01ba88
-
SHA1
b8e9479468e2421d2110715adbc260d53a8e0b1f
-
SHA256
0e78160a0f128bdf85b2d24c1c2b5025b9832761be2c651e55bfd1301a526398
-
SHA512
5e271585c467fddce82181b62723c821e145d6af662d2f51f963bd1646801aeb0f80cbbe2fc6664aba9181ff7a86f5222406aa4b61bbb6c3c6acc22db3db3087
-
SSDEEP
96:vd/UsedgMupb+jadUOLnzUUlePBJ5bhQVZuxsLaXt1do7URgqB69Qv:hrdXdU8o/hMLaXt1S7Hqo0
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5104 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5116 wrote to memory of 5104 5116 OpenWith.exe 95 PID 5116 wrote to memory of 5104 5116 OpenWith.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\images.jpg1⤵PID:1248
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:336
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\images.jpg2⤵
- Opens file in notepad (likely ransom note)
PID:5104
-