Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    27s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 00:21

General

  • Target

    DonnyhubPremium.exe

  • Size

    722KB

  • MD5

    34e3ccf886e1321131be0ea9e28d16ac

  • SHA1

    545343c4298a6fa9a8e4350be6b0ef1dedfeafe0

  • SHA256

    f56f8f938febb9ebade541493d3c9ea9bf64dfa78597e2ec9dba545e9afb1578

  • SHA512

    ee305fc82b7e2f868a11b585861f239c7d27d149a82a483b2154f71230c4e3e94f26dd10036a2045f1a01b9f265210bbda5a18919a3b38352d729457068ae464

  • SSDEEP

    12288:BO7FJJ7gIgVj2du42aCrMP5IaAPD67w9rVad7FtJ7gIDVj2du42a1:U7FJJMPRAu4fC45wu7we7FtJMsRAu4f1

Score
9/10

Malware Config

Signatures

  • Renames multiple (546) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Windows directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DonnyhubPremium.exe
    "C:\Users\Admin\AppData\Local\Temp\DonnyhubPremium.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    PID:1992
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\StepNew.cmd" "
    1⤵
      PID:2592
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x494 0x508
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1608
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\StepNew.cmd" "
      1⤵
        PID:1696
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\StepNew.cmd" "
        1⤵
          PID:1548
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\ConvertSplit.cmd" "
          1⤵
            PID:2292

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1992-0-0x000000007467E000-0x000000007467F000-memory.dmp

            Filesize

            4KB

          • memory/1992-1-0x0000000000D90000-0x0000000000E4A000-memory.dmp

            Filesize

            744KB

          • memory/1992-2-0x0000000074670000-0x0000000074E20000-memory.dmp

            Filesize

            7.7MB

          • memory/1992-3-0x0000000005F90000-0x0000000005FF6000-memory.dmp

            Filesize

            408KB

          • memory/1992-12-0x000000000A2F0000-0x000000000A328000-memory.dmp

            Filesize

            224KB

          • memory/1992-14-0x0000000074670000-0x0000000074E20000-memory.dmp

            Filesize

            7.7MB

          • memory/1992-13-0x000000000A2B0000-0x000000000A2BE000-memory.dmp

            Filesize

            56KB

          • memory/1992-15-0x0000000074670000-0x0000000074E20000-memory.dmp

            Filesize

            7.7MB

          • memory/1992-762-0x000000007467E000-0x000000007467F000-memory.dmp

            Filesize

            4KB

          • memory/1992-1087-0x0000000074670000-0x0000000074E20000-memory.dmp

            Filesize

            7.7MB