Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/04/2024, 11:18
240418-ned1xsbd66 1018/04/2024, 11:18
240418-nea92abd64 1018/04/2024, 11:18
240418-neay9scf7z 1018/04/2024, 11:18
240418-neacqscf7y 718/04/2024, 11:18
240418-nd92zacf7x 718/04/2024, 09:59
240418-lz5chaba8t 7Analysis
-
max time kernel
1791s -
max time network
1576s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win11-20240412-en
General
-
Target
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
-
Size
371KB
-
MD5
eafe645b56c3f5cb746fb5f8504f6035
-
SHA1
f539987de9fe59bff20483ac7a124afafc27036b
-
SHA256
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94
-
SHA512
61af2cfa960a72b66d54d0ee121acb5c54d455b05eb85fb2d7df2958d3134d348c87a5aef2aa46319532407f7ebf01eaedfb8dd889bb0f67ce5edc067445e806
-
SSDEEP
6144:hnzQnu/cmM1oSigOQT2F8U92Iu7DMVQZhWLv3RXdYX9ji+uhi2PsrhY:dzQnkM1oSiBGI8bxn5W6i+uo20tY
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b8692f92-ca60-4df5-a861-1e73dff5d3aa}\_DECRYPT_INFO_gtir.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\_DECRYPT_INFO_gtir.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\Users\Admin\Desktop\backup_gtir\_DECRYPT_INFO_gtir.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Signatures
-
Maktub Locker
Advanced ransomware family capable of offline decryption, generally distributed via .scr email attachments.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (197) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral3/memory/4472-209-0x0000000003990000-0x0000000003998000-memory.dmp acprotect behavioral3/memory/4472-208-0x0000000003990000-0x0000000003998000-memory.dmp acprotect behavioral3/memory/4472-205-0x0000000003990000-0x0000000003998000-memory.dmp acprotect -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3564 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 424 WINWORD.EXE 424 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 4472 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 920 vssvc.exe Token: SeRestorePrivilege 920 vssvc.exe Token: SeAuditPrivilege 920 vssvc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE 424 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4472 wrote to memory of 424 4472 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 75 PID 4472 wrote to memory of 424 4472 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 75 PID 4472 wrote to memory of 3564 4472 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 78 PID 4472 wrote to memory of 3564 4472 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 78 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe"C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.rtf" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:424
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3564
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5521b1b639e2d4966e89880334dca7969
SHA14d8225028a7cb4b1487bb1fc937fb8d3bb71f358
SHA2564b5c8cf7503e30ce69718a5b9d6c60c0c7703bc2343ca0e8cb77a414205eed40
SHA5126541641ab103da5d74cdde38c6560aa90cb45d11df2c77ec9233fc57aec43be62b939f50cbcabc49cc6f7b29cd45e76a0759aed7b7148c58b2561ca7f9e677fb
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{453ef255-e920-4f38-be1d-8e1a4370a94e}\0.1.filtertrie.intermediate.txt.gtir
Filesize48B
MD53ed1f44c0575a3ac4b65dda43863e3bb
SHA16dda020fc7b2072648242c39eda80f8952396f4b
SHA2565fa602bc4604dc442b1b16c7dcd6d561f26dcb592c7335feee4608774d2a5f6c
SHA512368f29e98541b98a3c8136c1b0cd6017e4ad15dc73a69dcf27d12f796d6cee991b7e7fb3cffb6e0d4c46cf6db07d1517f7bbab74657b95291ac0f3b0ea3c9f8f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{453ef255-e920-4f38-be1d-8e1a4370a94e}\0.2.filtertrie.intermediate.txt.gtir
Filesize48B
MD57ee77b134042fe414000aae4b72ddf27
SHA14fe45e8f62d09b8300faf6cc800a727eefc23efa
SHA256dbe16497656facecf944bd3fee85dd3739e042464f8df16b054199ca25f332d1
SHA512c95b90cd876b2ff5b2d292d3f3397aa603a1a9243fa33b2de699cbe8fa076b7c2145be2c79918705c360769ef456ce8d37f73a0348f0474dd653024e2a14cc9a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b8692f92-ca60-4df5-a861-1e73dff5d3aa}\_DECRYPT_INFO_gtir.html
Filesize12KB
MD5ae0401c9fe4999ec2310078d4957d76d
SHA11fb0ed9edc12a1074a5a4ea909e9ec0711285074
SHA256be4be4fce2062b6586098c97ec19e764abfc62f4991b37a2a95d667b32cb612e
SHA5123e3e6c932d984f6ee5a4f5857aea9ec35ebeb3632ca4b0221fbdbefc3cf40bf036ab135c909daea3b37bb4009764f80940410f64143346ebf6c5b82bec6e33c5
-
C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.rtf
Filesize4KB
MD52d5020c82de674b48cfd17cc20fcbba2
SHA14e317eaeebd839ee5f6eb3925a9fbee819c5349c
SHA256120becd55248f4a2ccbbc99ba9d3c2932223264a95cd72e9ae7568be61277e9a
SHA512ffbbdda009237d6825f6cd6f751a41f4f9d716186901ffdbeed56c2d1410245771decd07f591cf56cafdd4bbebd4e4c74f009ff15736d5321635e34ff17d0d8d
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
12KB
MD53de9ae240a90db98cc64c7de2a78d709
SHA150c1285f7559c9007bad513ba8e56fa1686f844d
SHA2567a2ecdc9b266b438a986c08dd0b2930748fa7560b5f6fbb386d266f0329ba826
SHA5126b71755cc6181f32cb8c0c7449e135b716217dc7700b1e9a929baf184dd82ba302cbf67a844700b047ffa5d9c1ce352dbc95b1d92eae3b2e79e6b25a2081f78c