Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1sample.tar
windows10-1703-x64
3aircrack-n...aph-ng
windows10-1703-x64
1aircrack-n...t__.py
windows10-1703-x64
3aircrack-n...rse.py
windows10-1703-x64
3aircrack-n...rse.py
windows10-1703-x64
3aircrack-n...viz.py
windows10-1703-x64
3aircrack-n...p-join
windows10-1703-x64
1aircrack-n...tup.py
windows10-1703-x64
3aircrack-n...reebsd
windows10-1703-x64
3aircrack-n....linux
windows10-1703-x64
3aircrack-n...update
windows10-1703-x64
1aircrack-n...ack.py
windows10-1703-x64
3aircrack-n...uck-ng
windows10-1703-x64
1aircrack-n...ng.vbs
windows10-1703-x64
1aircrack-n...ng.vbs
windows10-1703-x64
1aircrack-n...ng.vbs
windows10-1703-x64
1aircrack-n...mon.sh
windows10-1703-x64
3aircrack-n...lay.py
windows10-1703-x64
3aircrack-n...001.sh
windows10-1703-x64
3aircrack-n...002.sh
windows10-1703-x64
3aircrack-n...003.sh
windows10-1703-x64
3aircrack-n...001.sh
windows10-1703-x64
3aircrack-n...002.sh
windows10-1703-x64
3aircrack-n...003.sh
windows10-1703-x64
3aircrack-n...004.sh
windows10-1703-x64
3aircrack-n...005.sh
windows10-1703-x64
3aircrack-n...006.sh
windows10-1703-x64
3aircrack-n...007.sh
windows10-1703-x64
3aircrack-n...008.sh
windows10-1703-x64
3aircrack-n...009.sh
windows10-1703-x64
3aircrack-n...010.sh
windows10-1703-x64
3aircrack-n...011.sh
windows10-1703-x64
3Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/06/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
sample.tar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraph-ng
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/libDumpParse.py
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/libOuiParse.py
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/lib_Airgraphviz.py
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airodump-join
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
aircrack-ng-1.7/scripts/airgraph-ng/setup.py
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
aircrack-ng-1.7/scripts/airmon-ng.freebsd
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
aircrack-ng-1.7/scripts/airmon-ng.linux
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
aircrack-ng-1.7/scripts/airodump-ng-oui-update
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
aircrack-ng-1.7/scripts/dcrack.py
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
aircrack-ng-1.7/scripts/versuck-ng/versuck-ng
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
aircrack-ng-1.7/src/airbase-ng/airbase-ng.vbs
Resource
win10-20240611-en
Behavioral task
behavioral15
Sample
aircrack-ng-1.7/src/airventriloquist-ng/airventriloquist-ng.vbs
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
aircrack-ng-1.7/src/packetforge-ng/packetforge-ng.vbs
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
aircrack-ng-1.7/test/int-test-common.sh
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
aircrack-ng-1.7/test/replay.py
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
aircrack-ng-1.7/test/test-airbase-ng-0001.sh
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
aircrack-ng-1.7/test/test-airbase-ng-0002.sh
Resource
win10-20240611-en
Behavioral task
behavioral21
Sample
aircrack-ng-1.7/test/test-airbase-ng-0003.sh
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0001.sh
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0002.sh
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0003.sh
Resource
win10-20240611-en
Behavioral task
behavioral25
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0004.sh
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0005.sh
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0006.sh
Resource
win10-20240611-en
Behavioral task
behavioral28
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0007.sh
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0008.sh
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0009.sh
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0010.sh
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0011.sh
Resource
win10-20240404-en
General
-
Target
sample.tar
-
Size
18.1MB
-
MD5
b2fc3f9862bc1145b1930fcc54d92918
-
SHA1
db0e396ee41835416e14754bb3a41681a573353a
-
SHA256
bd967a2215834709c323924dcc7d1d11ee83afd22b84d07b595444be52aad4b0
-
SHA512
0950796d6926157501c1d24fa136f06f0a75871d16b3aab85cafc22eedc38cd4cb3b4f20f8d1a5f518546aed7e7ff5745b19bf905f71cb5370361ecb7617f850
-
SSDEEP
98304:0x8Xaw7m2WQFm2662ZiVDYFLAE0ZJe+0H7IgVY3U3rUEnN+uvhu0UdBP2geFvU70:IIP8+RtuFUq9KidOs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4796 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4920 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4796 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe 4920 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4796 4920 OpenWith.exe 74 PID 4920 wrote to memory of 4796 4920 OpenWith.exe 74
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sample.tar1⤵
- Modifies registry class
PID:2100
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\sample.tar2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:4796
-