Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2023, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
КикнадзеМД-bee2ed2e-межбанк.cms.req.7z
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
КикнадзеМД-bee2ed2e-межбанк.cms.req.7z
Resource
win10v2004-20231127-en
Behavioral task
behavioral3
Sample
КикнадзеМД-bee2ed2e-межбанк.cms.req.cer
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
КикнадзеМД-bee2ed2e-межбанк.cms.req.cer
Resource
win10v2004-20231127-en
General
-
Target
КикнадзеМД-bee2ed2e-межбанк.cms.req.7z
-
Size
1KB
-
MD5
1e42628fc9a790acc30864e2dd1399dc
-
SHA1
96266564c3a1cb0fc5f69d3699d3929b76363d88
-
SHA256
6dccfa9feef1ef8ce9073166fc57e1437d05d7e8ad0d594b021db4ee1cc6de4d
-
SHA512
7cf08b7a2f7a83fa2f746dad4a0f7371c97086e607b8faf6414444012d0282f30633966439f28861c8ec396d0d6d5e575f9328ed40937358a50e1b8be88241b5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 OpenWith.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe 2416 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\КикнадзеМД-bee2ed2e-межбанк.cms.req.7z1⤵
- Modifies registry class
PID:1572
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2416