Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 18:34
Behavioral task
behavioral1
Sample
r2.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
fivesense.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
fraps.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
rename_me_before.exe
Resource
win10v2004-20240802-en
General
-
Target
r2.rar
-
Size
11.4MB
-
MD5
d61aa7d47dc04c8ae284b73ea1ecd725
-
SHA1
00c5f146a1b69a0d4d25413644e36a071d0cee67
-
SHA256
3842d71609873022fdb4f18171aca6bb3871c4be570e0c02546dc3edca969838
-
SHA512
e8815e22f0aa82427775e415581c6dae8333dfa766d1e90b578be56ef5b83f7e6136e0918900f3f61a6f8865680fe12d1805c472a228132df1a37c491d841f11
-
SSDEEP
196608:5Xa+DA+gFm6i9ITCPYW9Cs1tkA+qXKec9FFAuOmd7J+ClZNUdWptRVORpBy:5qBJl6Zn1tw8Kec9FFVT+CdjFoy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1124 OpenWith.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\r2.rar1⤵
- Modifies registry class
PID:2936
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1124