Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/11/2023, 00:09

231124-aflv9see3x 6

23/11/2023, 23:51

231123-3wgkpsed3v 8

Analysis

  • max time kernel
    396s
  • max time network
    442s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 23:51

General

  • Target

  • Size

    4.4MB

  • MD5

    6a4853cd0584dc90067e15afb43c4962

  • SHA1

    ae59bbb123e98dc8379d08887f83d7e52b1b47fc

  • SHA256

    ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec

  • SHA512

    feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

  • SSDEEP

    98304:XyDt6K4MJVnjOobt/JN1LA5elHc+S4fRp5UvluKo:XyDtK8bbxn+IHcBEV/F

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 42 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 54 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs regedit.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4180
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x40c 0x320
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:320
  • C:\Windows\regedit.exe
    "C:\Windows\regedit.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks processor information in registry
    • Enumerates system info in registry
    • Runs regedit.exe
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2656
  • C:\Windows\system32\notepad.exe
    "C:\Windows\system32\notepad.exe" "C:\Users\Admin\Desktop\sssss.reg"
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2720
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1848
  • C:\Windows\system32\notepad.exe
    "C:\Windows\system32\notepad.exe" "C:\Users\Admin\Desktop\sssss.reg"
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:3544
  • C:\Windows\regedit.exe
    "regedit.exe" "C:\Users\Admin\Desktop\sssss.reg"
    1⤵
    • Checks BIOS information in registry
    • Modifies system executable filetype association
    • Registers COM server for autorun
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • Runs .reg file with regedit
    PID:5064
  • C:\Windows\regedit.exe
    "C:\Windows\regedit.exe"
    1⤵
    • Manipulates Digital Signatures
    • Modifies Installed Components in the registry
    • Registers COM server for autorun
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Runs regedit.exe
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3784
  • C:\Windows\system32\msinfo32.exe
    "C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Desktop\ResetClose.nfo"
    1⤵
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    512KB

    MD5

    dba7f1ca7d6aa8017682b1320c9067b1

    SHA1

    2a87c336f7919c4ac0e6bb9a5844bcd7df3b08e7

    SHA256

    d067305e2af7a5c1d606cb1e52bd1b19faa6c53f61a6dcf9648ffd87183cca73

    SHA512

    8619f06f810455f5394c0be251c1c9452e6568e28870f1958a6647b6b1fc8aaa9b6ac631bf2639795495f00717735dfcbefc6b60b711551d31b19cb7f37d5aad

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Temp\chilledwindows.mp4

    Filesize

    3.6MB

    MD5

    698ddcaec1edcf1245807627884edf9c

    SHA1

    c7fcbeaa2aadffaf807c096c51fb14c47003ac20

    SHA256

    cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b

    SHA512

    a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155

  • C:\Users\Admin\Desktop\sssss.reg

    Filesize

    33.4MB

    MD5

    7795033b93f1d9df7f453bdcac8bb991

    SHA1

    df9f57c70e95e5039333af019a53a05fff873a91

    SHA256

    115ce80344a299229da501fb73411a9ea6ccf31f8459dfcf87d53c433c1d8772

    SHA512

    b25a84ebf698f5979369dff11b43ad2ce812348c73b4cdbbc7fc7eeed77ebc4eb553a50a740e7a32a0d82f288d0ba0d458054c0a312aaf4c5b74965ef5cc8c02

  • C:\Users\Admin\Desktop\sssss.reg

    Filesize

    33.4MB

    MD5

    3302ccd86b539b8594628fd58b5cb959

    SHA1

    a9d549fec48acd911ba5e834b6280c2a465e0732

    SHA256

    86e6ae5778c8fb4af604b472c41f67f9ec43fe61d9c7be02792d6fbf5c312307

    SHA512

    3aa9b5f3ac22c8e389c2fdb15cb29a918decb963bf86265469de950f75ff4a14976b1424f172fb03bc4c06421a6ea03dde522f445b603aa1fc5967c581442960

  • memory/1848-66-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-56-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-65-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-64-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-63-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-62-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-67-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-68-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-58-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/1848-57-0x0000025952700000-0x0000025952701000-memory.dmp

    Filesize

    4KB

  • memory/4180-17-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-41-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-55-0x00007FFFB0710000-0x00007FFFB11D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4180-40-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-39-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-38-0x00007FFFB0710000-0x00007FFFB11D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4180-20-0x000000001D310000-0x000000001D31E000-memory.dmp

    Filesize

    56KB

  • memory/4180-19-0x000000001D340000-0x000000001D378000-memory.dmp

    Filesize

    224KB

  • memory/4180-18-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-0-0x0000000000350000-0x00000000007B4000-memory.dmp

    Filesize

    4.4MB

  • memory/4180-16-0x000000001B4E0000-0x000000001B4E8000-memory.dmp

    Filesize

    32KB

  • memory/4180-14-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-3-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-2-0x000000001B4D0000-0x000000001B4E0000-memory.dmp

    Filesize

    64KB

  • memory/4180-1-0x00007FFFB0710000-0x00007FFFB11D1000-memory.dmp

    Filesize

    10.8MB