Overview
overview
7Static
static
7trashreg_setup.exe
windows7-x64
7trashreg_setup.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Help/rtkf_deu.chm
windows7-x64
1Help/rtkf_deu.chm
windows10-2004-x64
1Help/rtkf_eng.chm
windows7-x64
1Help/rtkf_eng.chm
windows10-2004-x64
1Help/rtkf_esp.chm
windows7-x64
1Help/rtkf_esp.chm
windows10-2004-x64
1Help/rtkf_rus.chm
windows7-x64
1Help/rtkf_rus.chm
windows10-2004-x64
1TrashReg.exe
windows7-x64
7TrashReg.exe
windows10-2004-x64
7TrashRegX64.exe
windows7-x64
7TrashRegX64.exe
windows10-2004-x64
7rtkf_uninst.exe
windows7-x64
7rtkf_uninst.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 15:51
Behavioral task
behavioral1
Sample
trashreg_setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
trashreg_setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Help/rtkf_deu.chm
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Help/rtkf_deu.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Help/rtkf_eng.chm
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Help/rtkf_eng.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Help/rtkf_esp.chm
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Help/rtkf_esp.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Help/rtkf_rus.chm
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Help/rtkf_rus.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
TrashReg.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
TrashReg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
TrashRegX64.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
TrashRegX64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
rtkf_uninst.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
rtkf_uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
TrashRegX64.exe
-
Size
428KB
-
MD5
ad922b87444ba669f2c4a906180a4faa
-
SHA1
f2800e48aa79e6d7d1bdc6aed981d781a0bd126d
-
SHA256
c0a940b81e9970b1f73a91ed8a1f653e2a5d591587d68ddc837426854454121d
-
SHA512
177f62bc1cf1d7c9ed5ef66bb4eb4c28400e82140c53558db0281f50c2712e82b5b9692102477b15b8f634612cc30e4c739994e83149b89f78274232fb4d4b29
-
SSDEEP
6144:zR33YxcTBwg8OmaOqVgYokLNvVid6GlcS0FYg2vUWYWJEOsR/l9DYqCKa9B+W:zR33YxQuh6KtkpcEG2ZKv5sNzX/aH
Malware Config
Signatures
-
resource yara_rule behavioral16/memory/2108-0-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral16/memory/2108-1-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral16/memory/2108-6-0x0000000000400000-0x0000000000541000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\aa.dll TrashRegX64.exe File opened for modification C:\Windows\system32\is.dll TrashRegX64.exe File opened for modification C:\Windows\system32\svkp2.dll TrashRegX64.exe File opened for modification C:\Windows\system32\ispn2.dll TrashRegX64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrashRegX64.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\TempCLSID TrashRegX64.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TEMPCLSID TrashRegX64.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2108 TrashRegX64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.