Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2023, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
TEST.py
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
TEST.py
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
TEST.py
-
Size
41B
-
MD5
44757e4b69c710dc5ad8427c0383238e
-
SHA1
c88621f40f30a78e554face940efeb0d25ce6fdd
-
SHA256
0bd80872e1caac67d2fe2d648c6907d244655dd7a2da5286a53fa5e09ff0e6ec
-
SHA512
63da0c8b6145c9c5aac2dbb415db45480ee58c56018fd38bbe9960d345edcaf1752f334c430ea853ad3d724cd84c6f4a9d8665fcd2bfb2b05d2909597775bc3d
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2936 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe 2936 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TEST.py1⤵
- Modifies registry class
PID:696
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2936
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\StartRestart.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵PID:3928