Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2023, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
89e8997a-d12f-45b2-c4f3-08dbe1425971/806b4744-3a94-8651-7451-6026a58222a2.eml
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
89e8997a-d12f-45b2-c4f3-08dbe1425971/806b4744-3a94-8651-7451-6026a58222a2.eml
Resource
win10v2004-20231020-en
General
-
Target
89e8997a-d12f-45b2-c4f3-08dbe1425971/806b4744-3a94-8651-7451-6026a58222a2.eml
-
Size
17KB
-
MD5
2005014db2312c60338d019d1c4710b8
-
SHA1
7f04161f6181e61ac48534b299daddc7e3ed2229
-
SHA256
f6b457425a2272fd77e9e755e0a6453b0450ca147933b150072f2d54cd3b2083
-
SHA512
100c16a3326922c19d4c83a85bfa3351bbb53e63110701f899fe6a2386d3adcb08888e3da8fd8d0f87d77553e4f354c190d2ed4df90309790778cb790fa0b4e5
-
SSDEEP
192:bCwg4fHhoYVgGCzzvzy6MXuOC2JsrB4Ugv1J6NzcL5/1xY:bCwg2htmGC3vzDAtC4srB4UgdJ6db
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\89e8997a-d12f-45b2-c4f3-08dbe1425971\806b4744-3a94-8651-7451-6026a58222a2.eml:OECustomProperty cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3000 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\89e8997a-d12f-45b2-c4f3-08dbe1425971\806b4744-3a94-8651-7451-6026a58222a2.eml1⤵
- Modifies registry class
- NTFS ADS
PID:4864
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3000