Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
Megpoid_sweet/Megpoid_sweet.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Megpoid_sweet/Megpoid_sweet.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Megpoid_sweet/setup.bin
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Megpoid_sweet/setup.bin
Resource
win10v2004-20240709-en
General
-
Target
Megpoid_sweet/setup.bin
-
Size
152.1MB
-
MD5
c4af4bb5f1fadde8de2d36ac4d9e4d1a
-
SHA1
9b8b7551aa7d9697bd8a285a194762d154d91269
-
SHA256
5983328323db0f4d5f2a49780c599ac98a1e95c9f4da22092f63e4c86e12da5e
-
SHA512
281a1bb3e72000928dcd06cc1206b6689d5034c72c7632c96558171c43351659cc88dd7902b37cf288658a87049089cfd69a7cb1539593126fed48ac2bfcf2cb
-
SSDEEP
3145728:dki9Dn0DSbS0V2pbdDTlqH3ZLhMwdghXNQk81lfMXQ:2ihaS+0VsbdHSZLh3duSVZ6Q
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4764 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4480 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe 4480 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4764 4480 OpenWith.exe 96 PID 4480 wrote to memory of 4764 4480 OpenWith.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Megpoid_sweet\setup.bin1⤵
- Modifies registry class
PID:2392
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Megpoid_sweet\setup.bin2⤵
- Opens file in notepad (likely ransom note)
PID:4764
-