Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 15:33

General

  • Target

    WaitDox.py

  • Size

    10KB

  • MD5

    b73ca606bab4bb05ec029cb01444e56f

  • SHA1

    1526b7bcfcee2e99169f270995e3b0ea650f7ee5

  • SHA256

    24ec81587e065b247b64e4dfcf4242b13da40e94c9331ed7a830485fbcc4ed36

  • SHA512

    ee7b7573050617b25483f41cf0f62343410c434f12b74ba102533ba476129d169cf7725d7c68bba999646661083370bfea34fbbaeb33a38a393e0683b047bd37

  • SSDEEP

    192:EOAqz/1+6JCYiYMgKKjSao7r9o0/dZS0XAtwhZYtmnCSod7Aef:j9hKKjSao7r9o0lZScNjYtm6d7H

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 14 IoCs
  • Opens file in notepad (likely ransom note) 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\WaitDox.py
    1⤵
    • Modifies registry class
    PID:2832
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\WaitDox.py
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:660
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\text.py
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2184
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\text.py
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\text.py

    Filesize

    11KB

    MD5

    47a29edaf5fc38a7472aee81d5194089

    SHA1

    6e3bb25f018382f3dec3395026621b856e2e91e9

    SHA256

    259564999358ed6610674384b0ccc52837d86e6e2bd09d19c0cf1a2d83fdb4a5

    SHA512

    175a72b39d24c175b1be0806f49eae1021f126a62808ff668978d2575ae41024325fb2c52a8084503f1e036f657765896ac44592755ea77b03d116b89f7e9419