Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/06/2024, 16:57

240625-vf9bsa1hrg 5

25/06/2024, 16:08

240625-tle5fszdkg 8

Analysis

  • max time kernel
    38s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 16:57

General

  • Target

    download.jpg

  • Size

    6KB

  • MD5

    575f99dd2f4455ab67eac43906bcc963

  • SHA1

    2a68146dde2898208eb74bfb50c90a2b5994c921

  • SHA256

    950a0e8ce3cc72fa0c9974a0fd6759b5b9efd1a7e33d37f5b6ec8b8fa1b27eb3

  • SHA512

    7d782e2223b85a3e9ff2df3b8d00583f90b8e139ef9fc0e36c60b6fd790c36590ebb53e2f8c04849977036f70f2e03bb723f4a97d83246e7a40b103e6a0dbd8e

  • SSDEEP

    96:pnqZvyduuJ9ztAlzYi1fra0bRXSkGjmOTax0eucql3TwSn+STAoxRAmbuqwTrP9g:pqZruJ9eZbQj342L+APrvKqw6OJtHYFX

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\download.jpg
    1⤵
      PID:4192
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1596
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\download.jpg" /ForceBootstrapPaint3D
        1⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3524
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
        1⤵
        • Drops file in System32 directory
        PID:1060
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3940
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\BroadcastMsg_1718131703.txt
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:4504
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt
        1⤵
          PID:372

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1060-4-0x0000011BCE180000-0x0000011BCE190000-memory.dmp

          Filesize

          64KB

        • memory/1060-0-0x0000011BCE140000-0x0000011BCE150000-memory.dmp

          Filesize

          64KB

        • memory/1060-11-0x0000011BD6DD0000-0x0000011BD6DD1000-memory.dmp

          Filesize

          4KB

        • memory/1060-13-0x0000011BD6E50000-0x0000011BD6E51000-memory.dmp

          Filesize

          4KB

        • memory/1060-15-0x0000011BD6E50000-0x0000011BD6E51000-memory.dmp

          Filesize

          4KB

        • memory/1060-17-0x0000011BD6EE0000-0x0000011BD6EE1000-memory.dmp

          Filesize

          4KB

        • memory/1060-16-0x0000011BD6EE0000-0x0000011BD6EE1000-memory.dmp

          Filesize

          4KB

        • memory/1060-19-0x0000011BD6EF0000-0x0000011BD6EF1000-memory.dmp

          Filesize

          4KB

        • memory/1060-18-0x0000011BD6EF0000-0x0000011BD6EF1000-memory.dmp

          Filesize

          4KB