Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/09/2023, 08:52
230919-ks2glaaa53 119/09/2023, 08:12
230919-j37kxshg95 519/09/2023, 08:09
230919-j2f2ksfg2z 5Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
message_19092023_0822.eml
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
message_19092023_0822.eml
Resource
win10v2004-20230915-en
General
-
Target
message_19092023_0822.eml
-
Size
264KB
-
MD5
8d82bea1223c77cd66405de356255369
-
SHA1
aaab8ca3020caa2cf519872b210310a74d478b5c
-
SHA256
7d66e768ed6851b0e4f74c94b7b86c1d24ee779e89d7dfc0f51d12a135d6e9ce
-
SHA512
93e0cc21c2505a6294a677c641e9f4e21f77572fe92f59324e985c25a3e602845a120745dc7b0faf4051fd5841c57916b24e84d99d9afee0d85817869964f3d1
-
SSDEEP
6144:GPOx5diCley+UZ1hJ5+k/dLVHquGkcf3o4wUTuV6jPmreQViwY3GJ/ym:GPOxFYy+UZTJ5+wsuGkcg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\message_19092023_0822.eml:OECustomProperty cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4948 svchost.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe 4424 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\message_19092023_0822.eml1⤵
- Modifies registry class
- NTFS ADS
PID:4816
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4424
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5e07be9033cde63409dbf65b2d4f4d588
SHA10fce8df989841f52ae61b516f98d60baafe52d66
SHA256326946704a3e126489948e890c612497e9a6c0e4aab8ed5938eee4bd19fd7585
SHA51275b26bb15ffb479f4481462759e72013cb45a38813668b4ff5be101cf3d1a04afa8541f72be654b97083a7104aedf1951971c01e97f384639e572c85ba53ea78