Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1561s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
KEYGEN-FFF.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
KEYGEN-FFF.zip
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
FFF.nfo
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
FFF.nfo
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
FILE_ID.diz
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
FILE_ID.diz
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
WinRAR.v5.01_KEYGEN-FFF.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
WinRAR.v5.01_KEYGEN-FFF.exe
Resource
win10-20240404-en
General
-
Target
FILE_ID.diz
-
Size
427B
-
MD5
6a9dc23c547187752ee8c2081dcda8be
-
SHA1
3d1ed4ffd9db1ec06efaf7cb3d73e828b0f6873f
-
SHA256
3263dd0445eedd00863350b9215ab40e1f8ed6592e3f7cca9d2408bd662b5e48
-
SHA512
fd7a841cab7340ac5d4fd6f61dc0179a70dc3869b217ceed7113514381e18d7101cedd86574e5ed5c4cfdc18cda0e1aaaded9020b4d4c39707b3ecf4cd89cae6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.diz rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\shell\edit\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.diz\ = "diz_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\diz_auto_file\shell\open rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2812 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2732 3048 cmd.exe 29 PID 3048 wrote to memory of 2732 3048 cmd.exe 29 PID 3048 wrote to memory of 2732 3048 cmd.exe 29 PID 2732 wrote to memory of 2812 2732 rundll32.exe 30 PID 2732 wrote to memory of 2812 2732 rundll32.exe 30 PID 2732 wrote to memory of 2812 2732 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FILE_ID.diz1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\FILE_ID.diz2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\FILE_ID.diz3⤵
- Opens file in notepad (likely ransom note)
PID:2812
-
-