Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 08:49

General

  • Target

    海市蜃楼[云].exe

  • Size

    6.6MB

  • MD5

    266189a80d0b53ae6ca6b91184963d21

  • SHA1

    98c45a479388c992d18a02a4d8a929e682130bef

  • SHA256

    05a7d4f830a8702ad0d885c2cda8a2dce8e7e4d91d097caae7367ef5c0b558db

  • SHA512

    8702723bc32604d38b1a61dbd7e7d0e7c9930e59ccac6f9bc7d90bcf278cceeae598465e1acbd94caa832bfa05d20d06008dcbeeb4fb199ddebeb31646a2f895

  • SSDEEP

    98304:Vzbt8p9uc7R7m8mKFujq6wrUkUTQ23s+PLK3vfiCYuE+FZD8xQIONTclaGPbwAnz:6pQ+uvTQ23s+PO3vfpYisQIOpKJM

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\海市蜃楼[云].exe
    "C:\Users\Admin\AppData\Local\Temp\海市蜃楼[云].exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads