Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 22:07
Behavioral task
behavioral1
Sample
prank.exe
Resource
win10v2004-20240412-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
prank.pyc
Resource
win10v2004-20240412-en
5 signatures
150 seconds
General
-
Target
prank.pyc
-
Size
36KB
-
MD5
1243364bbcf987a63cb6694971c04520
-
SHA1
33643f271f79e5675a93da0a297b20be43ea4e10
-
SHA256
afe6410e29ed5a28ae686fbc6075ad27abd6f4fcd8361f459fffff0e5a9323b2
-
SHA512
676468331a4b72e3407ec2827ac643371997a4821faf3ab906cf0535c6b9d596dab19730bb695f6c289abe209d5c18a9ced63c261202c40e7503173eff4dc219
-
SSDEEP
768:9KS0wO6wK6oI6An+XbfLXbv2J5b8ftvz9Oyd5PooooonooyWx8NJHu9:9KS05Opu+XbfLXbv2J5b8ft7r7Pooooq
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3564 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe 1596 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3564 1596 OpenWith.exe 96 PID 1596 wrote to memory of 3564 1596 OpenWith.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\prank.pyc1⤵
- Modifies registry class
PID:1944
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\prank.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:3564
-