Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
WaitDox.py
Resource
win10v2004-20240508-en
General
-
Target
WaitDox.py
-
Size
10KB
-
MD5
b73ca606bab4bb05ec029cb01444e56f
-
SHA1
1526b7bcfcee2e99169f270995e3b0ea650f7ee5
-
SHA256
24ec81587e065b247b64e4dfcf4242b13da40e94c9331ed7a830485fbcc4ed36
-
SHA512
ee7b7573050617b25483f41cf0f62343410c434f12b74ba102533ba476129d169cf7725d7c68bba999646661083370bfea34fbbaeb33a38a393e0683b047bd37
-
SSDEEP
192:EOAqz/1+6JCYiYMgKKjSao7r9o0/dZS0XAtwhZYtmnCSod7Aef:j9hKKjSao7r9o0lZScNjYtm6d7H
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\缾痻፮耀\ = "py_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\缾痻፮耀 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\.py\ = "py_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\.py OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\py_auto_file OpenWith.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 660 NOTEPAD.EXE 2184 NOTEPAD.EXE 4536 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3520 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe 3520 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3520 wrote to memory of 660 3520 OpenWith.exe 88 PID 3520 wrote to memory of 660 3520 OpenWith.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WaitDox.py1⤵
- Modifies registry class
PID:2832
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\WaitDox.py2⤵
- Opens file in notepad (likely ransom note)
PID:660
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\text.py1⤵
- Opens file in notepad (likely ransom note)
PID:2184
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\text.py1⤵
- Opens file in notepad (likely ransom note)
PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD547a29edaf5fc38a7472aee81d5194089
SHA16e3bb25f018382f3dec3395026621b856e2e91e9
SHA256259564999358ed6610674384b0ccc52837d86e6e2bd09d19c0cf1a2d83fdb4a5
SHA512175a72b39d24c175b1be0806f49eae1021f126a62808ff668978d2575ae41024325fb2c52a8084503f1e036f657765896ac44592755ea77b03d116b89f7e9419