Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/03/2024, 13:43
240318-q1nhlaag4w 10Analysis
-
max time kernel
292s -
max time network
253s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/04/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win11-20240412-en
General
-
Target
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
-
Size
947KB
-
MD5
39217b125403ff7c755622ef9bbef974
-
SHA1
9fc607b7c17919c83999bdd119e9cd6bf413101a
-
SHA256
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816
-
SHA512
1252ea94931eaf4426ca1eb94a070645238775c447a09286109fe894c569de29ca502882a0fa34e97e09109c43c486a3aa32081e3a3afef0b6557db59c71fc50
-
SSDEEP
12288:3+Zn/gJtKaNIBpB+iMMOD30ZnZ47m0T3JF9j3GOF0l7B2FzqL2aZa7rf58bs:3+RYeaNILZi/JDLG60y1aZvs
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral1/memory/2932-5836-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5840-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5843-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5847-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5848-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5849-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5850-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5851-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5852-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5855-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5856-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5857-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5858-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5859-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5860-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5861-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5862-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5863-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5864-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5865-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5866-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5867-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5868-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5869-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5870-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5871-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5872-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5873-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5874-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5875-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5876-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5877-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2932-5878-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2932 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 2932 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe 2932 3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"C:\Users\Admin\AppData\Local\Temp\3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5946655472c6a17da8d855063a3450df9
SHA1b3172e88aa05f44dfea7ffcfb9ea6ced9d78e224
SHA256221695da3e66a038866c5b0f7ee19b6c82c3128cbc6acbb5ee3d9aa24678c49f
SHA512cac712d25ffeef67039873778834de8956443ffdffdda1d3c12ba16045f82b05d52455206300fa72d9420e14b41b40fbe36378c52d72badba4f4c4c4446b45e4
-
Filesize
71KB
MD58fc86fa4fe790434d3bc75767795cb56
SHA1c8967a87e39ce6fdc011efbd6285ee398c22479a
SHA2562739a38bbdedbe939bc109fc11fe63a452458c1c56e6518a35991de3c6b6e38d
SHA512074fd169ab51f45ba10b113016fc6b4f7116f621148ff4be1a7097fd21c3df39bdf03899d3b9dfc39c13a12dce790c3b694437aab6a5bc53e0346318ecd82444