Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1COVAULT-19...r).rar
windows10-2004-x64
3COVAULT-19...s.json
windows10-2004-x64
3COVAULT-19...19.exe
windows10-2004-x64
1COVAULT-19...19.exe
windows10-2004-x64
3COVAULT-19...19.pdb
windows10-2004-x64
3COVAULT-19...v.json
windows10-2004-x64
3COVAULT-19...g.json
windows10-2004-x64
3COVAULT-19...ry.dll
windows10-2004-x64
1COVAULT-19...on.dll
windows10-2004-x64
1COVAULT-19...og.dll
windows10-2004-x64
1COVAULT-19...ol.dll
windows10-2004-x64
1COVAULT-19...ws.dll
windows10-2004-x64
1COVAULT-19...er.dll
windows10-2004-x64
1COVAULT-19...er.dll
windows10-2004-x64
1COVAULT-19...ws.dll
windows10-2004-x64
1COVAULT-19...og.dll
windows10-2004-x64
1COVAULT-19...ol.dll
windows10-2004-x64
1COVAULT-19...ws.dll
windows10-2004-x64
1COVAULT-19...ry.dll
windows10-2004-x64
1COVAULT-19...er.dll
windows10-2004-x64
1COVAULT-19...rp.dll
windows10-2004-x64
1Analysis
-
max time kernel
1554s -
max time network
1583s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
COVAULT-19 (server).rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
COVAULT-19 (server)/COVAULT-19.deps.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
COVAULT-19 (server)/COVAULT-19.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
COVAULT-19 (server)/COVAULT-19.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
COVAULT-19 (server)/COVAULT-19.pdb
Resource
win10v2004-20230221-en
Behavioral task
behavioral6
Sample
COVAULT-19 (server)/COVAULT-19.runtimeconfig.dev.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
COVAULT-19 (server)/COVAULT-19.runtimeconfig.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
COVAULT-19 (server)/Microsoft.Win32.Registry.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
COVAULT-19 (server)/Newtonsoft.Json.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
COVAULT-19 (server)/System.Diagnostics.EventLog.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
COVAULT-19 (server)/System.Security.AccessControl.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
COVAULT-19 (server)/System.Security.Principal.Windows.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
COVAULT-19 (server)/System.ServiceProcess.ServiceController.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
COVAULT-19 (server)/WindowsFirewallHelper.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
COVAULT-19 (server)/runtimes/unix/lib/netcoreapp2.1/System.Security.Principal.Windows.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
COVAULT-19 (server)/runtimes/win/lib/netcoreapp2.0/System.Diagnostics.EventLog.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
COVAULT-19 (server)/runtimes/win/lib/netcoreapp2.0/System.Security.AccessControl.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
COVAULT-19 (server)/runtimes/win/lib/netcoreapp2.1/System.Security.Principal.Windows.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
COVAULT-19 (server)/runtimes/win/lib/netstandard2.0/Microsoft.Win32.Registry.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
COVAULT-19 (server)/runtimes/win/lib/netstandard2.0/System.ServiceProcess.ServiceController.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
COVAULT-19 (server)/websocket-sharp.dll
Resource
win10v2004-20230220-en
General
-
Target
COVAULT-19 (server)/COVAULT-19.deps.json
-
Size
13KB
-
MD5
77b946036651a45b9a940361b668ff4c
-
SHA1
8e8f9e4ecfbd67c785e26c6a8e148cbe3cc98be3
-
SHA256
738a01d18ef137469d5cb7b9abdfddc4e8eb7ee0d6bb342d95a325f6341caf7f
-
SHA512
2a8eb839c1e1ef13256f0216dd43072b748dc2558fab29f67fb2d3c4d4a748af759a056811b3dded34bd721699cae731bac2869fd6aecfe6d74ed9f44b53cc92
-
SSDEEP
192:Y1DCqRRCcpUytCVqKAKKrRGXV5vfa4X3T7:YYGRCcpUywGbrcFY4P
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4880 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4880 wrote to memory of 1944 4880 OpenWith.exe 93 PID 4880 wrote to memory of 1944 4880 OpenWith.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\COVAULT-19 (server)\COVAULT-19.deps.json"1⤵
- Modifies registry class
PID:4164
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\COVAULT-19 (server)\COVAULT-19.deps.json2⤵PID:1944
-