Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3dsa.rar
windows10-2004-x64
3Best Insta...deploy
windows10-2004-x64
3Best Insta...cation
windows10-2004-x64
1Best Insta....1.exe
windows10-2004-x64
1Best Insta...nifest
windows10-2004-x64
3Best Insta...up.exe
windows10-2004-x64
7Best Insta...deploy
windows10-2004-x64
3Best Insta...cation
windows10-2004-x64
1Best Insta....1.exe
windows10-2004-x64
1Best Insta...nifest
windows10-2004-x64
3Best Insta...cation
windows10-2004-x64
1Best Insta...ip.dll
windows10-2004-x64
1Best Insta...CE.zip
windows10-2004-x64
1Best Insta...er.exe
windows10-2004-x64
7Best Insta...st.exe
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2023, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
dsa.rar
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
Best Instagram Bot 4.1/Application Files/98p.ico.deploy
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Best Instagram Bot 4.1/Application Files/Best Instagram Bot 4.1.application
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
Best Instagram Bot 4.1/Application Files/Best Instagram Bot 4.1.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Best Instagram Bot 4.1/Application Files/Best Instagram Bot 4.1.exe.manifest
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Best Instagram Bot 4.1/Setup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Best Instagram Bot 4.1/usersys/Application Files/98p.ico.deploy
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Best Instagram Bot 4.1/usersys/Application Files/Best Instagram Bot 4.1.application
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Best Instagram Bot 4.1/usersys/Application Files/Best Instagram Bot 4.1.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral10
Sample
Best Instagram Bot 4.1/usersys/Application Files/Best Instagram Bot 4.1.exe.manifest
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Best Instagram Bot 4.1/usersys/Best Instagram Bot 4.1.application
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Best Instagram Bot 4.1/usersys/Ionic.Zip.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Best Instagram Bot 4.1/usersys/LICENCE.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
Best Instagram Bot 4.1/usersys/Launcher.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Best Instagram Bot 4.1/usersys/st.exe
Resource
win10v2004-20230220-en
General
-
Target
dsa.rar
-
Size
986KB
-
MD5
e6a7c255ec041a8ddecf90a2ac5d1b38
-
SHA1
46f5025bf184654b34cfe1a3ebfdf07fba41fbe4
-
SHA256
15b8ea286ec25a55cfba25409a30533ce8026ba440eff6234b121f5b1fb37adb
-
SHA512
54ab7390e4fd9e79259744fdce733e686306b27f14b2acd44909b4be954ce91bdb2b782233f16a591de29116185edcd01c85f5e1c4802fde7ed7b05d7f1bf3b4
-
SSDEEP
24576:c4II3ayj2FZi73r4IIRF8gDiNwSH2RLuYiqmNlA0oVM0:cuayj2FG3rLgD6h+utFlA0IM0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file\shell\edit OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\䲑边둃쥀畿ȁ\ = "rar_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\セ콀耀\ = "rar_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\.rar OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\䲑边둃쥀畿ȁ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\セ콀耀 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\rar_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\.rar\ = "rar_auto_file" OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1968 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2164 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe 2164 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2164 wrote to memory of 1968 2164 OpenWith.exe 87 PID 2164 wrote to memory of 1968 2164 OpenWith.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dsa.rar1⤵
- Modifies registry class
PID:4324
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\dsa.rar2⤵
- Opens file in notepad (likely ransom note)
PID:1968
-