Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 17:09

General

  • Target

    b538015bcbdaa4a8997b45f88add38be.dll

  • Size

    180KB

  • MD5

    b538015bcbdaa4a8997b45f88add38be

  • SHA1

    84842a36447d2a205d60cfa4c06fe9b6f69f2d03

  • SHA256

    189d48b6da8b247fb15f6b1021f668a8bc6739965de8dbf7cab9698478e8c2a2

  • SHA512

    02859c8cfd4cf08ebfa8440607c0b58c6b27d4c08a97ed9a81df5251ee46826a3edf137e3ec85c539ed262c39e9954a6a4b91f3ee4400017c9b054bcb5018ad3

  • SSDEEP

    1536:bIYmy/vfY+0Q1sLoCaRL5YLnQVhLZB2aBoucf09mxdGyk161KpoPvHWfkV76htLK:nhLm0LZKbf9Eykpp4ff76LLK

Malware Config

Signatures

  • MountLocker Ransomware

    Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 25 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b538015bcbdaa4a8997b45f88add38be.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b538015bcbdaa4a8997b45f88add38be.dll,#1
      2⤵
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E57AD76.bat" "C:\Users\Admin\AppData\Local\Temp\b538015bcbdaa4a8997b45f88add38be.dll""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\b538015bcbdaa4a8997b45f88add38be.dll"
          4⤵
          • Views/modifies file attributes
          PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\WindowsRE\RecoveryManual.html

    Filesize

    2KB

    MD5

    50ba84406e6088fedfb6ef20251c727b

    SHA1

    9c919e6d5e8427bb4f7576a26a17248d3607931f

    SHA256

    6d45903f502b8f9ce0dfd95ca3b907c3e3555f37540d9366cc90d7586d3a5684

    SHA512

    39c8d133e6420bbaccff123e39559e3868ff0ef6a0a71b2fc1c2964ce52503e63a22cc2b02b91a6d5a3f9aa7a916ab4b1f42a43ac3c73804d077abdc6d1c4974

  • C:\Users\Admin\AppData\Local\Temp\0E57AD76.bat

    Filesize

    65B

    MD5

    348cae913e496198548854f5ff2f6d1e

    SHA1

    a07655b9020205bd47084afd62a8bb22b48c0cdc

    SHA256

    c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

    SHA512

    799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

  • memory/3684-82-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-5-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-46-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-10-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-0-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-83-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-3-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-1131-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-1134-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-1-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB

  • memory/3684-1141-0x0000000000C90000-0x0000000000D56000-memory.dmp

    Filesize

    792KB