Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/05/2024, 14:25
240508-rra2ksgg7y 308/05/2024, 13:07
240508-qcv8jaea8w 1008/05/2024, 13:02
240508-p95ykagc48 308/05/2024, 12:59
240508-p7317adf7y 3Analysis
-
max time kernel
295s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
HL_ucheniy.jpg
Resource
win10v2004-20240419-en
Errors
General
-
Target
HL_ucheniy.jpg
-
Size
5KB
-
MD5
9ad53fcca40122a3c259fd5dc9776775
-
SHA1
05a701bfc794b31b4605df0d72b2109e2f1918ef
-
SHA256
e627d7709bd65f4c43157df5a13ae109d6cb6c4b9c991f26e1739c2422a1315a
-
SHA512
87bf5484ebcbb6f0e1320dc189dcda302bcf62ed64dd73ab0d6c20c982a180b4d9d681a5fb065d05d2bf949addf7356b0b06b831476a0dec593667fc3313fd36
-
SSDEEP
96:/WkR7QJRwPwpgtieTQAbTl31CnkZvxYdFH7VJY/818vLNFmnh6sPLspETMyZqh:/oSwpyi8skZveH7VK/A8jTmHjmEIyZqh
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 2632 created 2304 2632 taskmgr.exe 119 PID 2632 created 2304 2632 taskmgr.exe 119 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5276 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 1344 taskkill.exe 5320 taskkill.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 2784 NOTEPAD.EXE 2024 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2632 taskmgr.exe Token: SeSystemProfilePrivilege 2632 taskmgr.exe Token: SeCreateGlobalPrivilege 2632 taskmgr.exe Token: SeDebugPrivilege 1344 taskkill.exe Token: SeDebugPrivilege 5320 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe 2632 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 1040 3968 cmd.exe 130 PID 3968 wrote to memory of 1040 3968 cmd.exe 130 PID 3968 wrote to memory of 3588 3968 cmd.exe 131 PID 3968 wrote to memory of 3588 3968 cmd.exe 131 PID 3968 wrote to memory of 4264 3968 cmd.exe 132 PID 3968 wrote to memory of 4264 3968 cmd.exe 132 PID 3968 wrote to memory of 3100 3968 cmd.exe 133 PID 3968 wrote to memory of 3100 3968 cmd.exe 133 PID 3968 wrote to memory of 2476 3968 cmd.exe 134 PID 3968 wrote to memory of 2476 3968 cmd.exe 134 PID 3968 wrote to memory of 4904 3968 cmd.exe 135 PID 3968 wrote to memory of 4904 3968 cmd.exe 135 PID 3968 wrote to memory of 4004 3968 cmd.exe 136 PID 3968 wrote to memory of 4004 3968 cmd.exe 136 PID 3968 wrote to memory of 380 3968 cmd.exe 137 PID 3968 wrote to memory of 380 3968 cmd.exe 137 PID 3968 wrote to memory of 1860 3968 cmd.exe 138 PID 3968 wrote to memory of 1860 3968 cmd.exe 138 PID 3968 wrote to memory of 4684 3968 cmd.exe 139 PID 3968 wrote to memory of 4684 3968 cmd.exe 139 PID 3968 wrote to memory of 3956 3968 cmd.exe 140 PID 3968 wrote to memory of 3956 3968 cmd.exe 140 PID 3968 wrote to memory of 5084 3968 cmd.exe 141 PID 3968 wrote to memory of 5084 3968 cmd.exe 141 PID 3968 wrote to memory of 4944 3968 cmd.exe 142 PID 3968 wrote to memory of 4944 3968 cmd.exe 142 PID 3968 wrote to memory of 2420 3968 cmd.exe 143 PID 3968 wrote to memory of 2420 3968 cmd.exe 143 PID 3968 wrote to memory of 3996 3968 cmd.exe 144 PID 3968 wrote to memory of 3996 3968 cmd.exe 144 PID 3968 wrote to memory of 2576 3968 cmd.exe 145 PID 3968 wrote to memory of 2576 3968 cmd.exe 145 PID 3968 wrote to memory of 1056 3968 cmd.exe 146 PID 3968 wrote to memory of 1056 3968 cmd.exe 146 PID 3968 wrote to memory of 668 3968 cmd.exe 147 PID 3968 wrote to memory of 668 3968 cmd.exe 147 PID 3968 wrote to memory of 4476 3968 cmd.exe 148 PID 3968 wrote to memory of 4476 3968 cmd.exe 148 PID 3968 wrote to memory of 468 3968 cmd.exe 149 PID 3968 wrote to memory of 468 3968 cmd.exe 149 PID 3968 wrote to memory of 2364 3968 cmd.exe 150 PID 3968 wrote to memory of 2364 3968 cmd.exe 150 PID 3968 wrote to memory of 2960 3968 cmd.exe 151 PID 3968 wrote to memory of 2960 3968 cmd.exe 151 PID 3968 wrote to memory of 1952 3968 cmd.exe 152 PID 3968 wrote to memory of 1952 3968 cmd.exe 152 PID 3968 wrote to memory of 1912 3968 cmd.exe 153 PID 3968 wrote to memory of 1912 3968 cmd.exe 153 PID 3968 wrote to memory of 1140 3968 cmd.exe 154 PID 3968 wrote to memory of 1140 3968 cmd.exe 154 PID 3968 wrote to memory of 4564 3968 cmd.exe 155 PID 3968 wrote to memory of 4564 3968 cmd.exe 155 PID 3968 wrote to memory of 5032 3968 cmd.exe 156 PID 3968 wrote to memory of 5032 3968 cmd.exe 156 PID 3968 wrote to memory of 1400 3968 cmd.exe 157 PID 3968 wrote to memory of 1400 3968 cmd.exe 157 PID 3968 wrote to memory of 4152 3968 cmd.exe 158 PID 3968 wrote to memory of 4152 3968 cmd.exe 158 PID 3968 wrote to memory of 1396 3968 cmd.exe 159 PID 3968 wrote to memory of 1396 3968 cmd.exe 159 PID 3968 wrote to memory of 3044 3968 cmd.exe 160 PID 3968 wrote to memory of 3044 3968 cmd.exe 160 PID 3968 wrote to memory of 2996 3968 cmd.exe 161 PID 3968 wrote to memory of 2996 3968 cmd.exe 161
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\HL_ucheniy.jpg1⤵PID:1380
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\noworkaz.bat1⤵
- Opens file in notepad (likely ransom note)
PID:2784
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\noworkaz.bat"1⤵PID:2304
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2632
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\5be19fe2d2a345f0af3e39f279c7ad4d /t 2904 /p 23041⤵PID:1532
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\noworkaz.bat1⤵
- Opens file in notepad (likely ransom note)
PID:2024
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\noworkaz.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\notepad.exenotepad2⤵PID:1040
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3588
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4264
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3100
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2476
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4904
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4004
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:380
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1860
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4684
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3956
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:5084
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4944
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2420
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3996
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2576
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1056
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:668
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4476
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:468
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2364
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2960
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1952
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1912
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1140
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4564
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:5032
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1400
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4152
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1396
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3044
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2996
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3056
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4496
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4332
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1284
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2204
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:5028
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1412
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:692
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1240
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2820
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:1408
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3068
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2540
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2724
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4768
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2320
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4992
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4732
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3024
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4056
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2096
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3992
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:2108
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4176
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:4632
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:3236
-
-
C:\Windows\system32\notepad.exenotepad2⤵PID:720
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\system32\timeout.exetimeout 102⤵
- Delays execution with timeout.exe
PID:5276
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im svchost.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721B
MD512fbd77bf6116ae7501d543408c88561
SHA1d4060da364b31643d14e9ac07fac03cbcf9b8765
SHA256fef724a0f41e24d68c47c3d51b75649511ccb9d65f947cc7219955401872a85a
SHA512137901222a2edcc2055c2f082c684dfbaa519c088386f3bddec1d8bd3ac61924f0462f8310d70149c00eb7d26eae7ce61cde6ab475f650667ce49bb70918a004
-
Filesize
1KB
MD5aeaac246f7b89101fc7534f833afcd92
SHA13296fa5f1a8276567f0ab8b207ec868d85cf307b
SHA256a32e0057cf1e81d733ea404676a2fdde79b1547b745b467a68d075c544f3afe8
SHA512ef66e37467ca0a58d7fde3f9414b8c466fb933ff5530b5bcd8da29177bc8b92c8c4070affc429850e6e5d1661fe99ff56a6f9c49ac4211b5940833871443c930