Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
₳DÐ✵SetUp✓.rar
Resource
win7-20240704-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
₳DÐ✵SetUp✓.rar
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
₳DÐ✵SetUp✓.rar
-
Size
8.5MB
-
MD5
5d0c8abc86adea499721b5dc5c18a051
-
SHA1
ecc13d3a5e8a7a8b6f39210217cf02dcbceb13e4
-
SHA256
1430a8017f70cb7a485c305b23b18ab4785eeeb9762a02f0b734b8f80a3d48ca
-
SHA512
572ffd179d1bb3bea966329d0ce4e6e90ff46431401ab7df5519ccefb752d5e2a72ef109945423cc40e6d7572ba00773f16d5d0ecf1a5e4082ef45f33cd000c6
-
SSDEEP
196608:SHeNLNKVESOTYBymKYEn8ocH3HqqdHpG/+JI2gDHxDMcxw:lNYe71mK1oDGzNM3
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3240 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe 3240 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\₳DÐ✵SetUp✓.rar1⤵
- Modifies registry class
PID:1208
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3240
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:704