Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    18/09/2024, 19:51

General

  • Target

    FTA RansomWare _v1.exe

  • Size

    1014KB

  • MD5

    a7b8806b659ae2a4c48e5f629770f43c

  • SHA1

    dc0cb3053a637fdf943505e0737c31a9c8bb07ea

  • SHA256

    699a801e471e0ba3e476ee77e731ff452513ab36ca3b4bf3cd488e6d16f3fd54

  • SHA512

    0ad1e00f3624bcf6b2ee05b33ba2f726229995cc57bfcf68530612da1be8762a86be19d1c5b4b76e45054bdd9f45025d684635f20c86d71ae14c3aeb2b31379e

  • SSDEEP

    12288:z5JD3ARJi6rNnIedM647WcO5DmxPgdsxWxAwjxSD/jvE5+5jv1iDo02+:z5JD3b6rd8U6QscxAwjxSDbvRco02+

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FTA RansomWare _v1.exe
    "C:\Users\Admin\AppData\Local\Temp\FTA RansomWare _v1.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    PID:3736
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
    1⤵
      PID:4612
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1684
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1444
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
      1⤵
        PID:384
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
        1⤵
          PID:1152

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\4GIJNPEI\microsoft.windows[1].xml

          Filesize

          97B

          MD5

          ca629704a772846923552060821f7d92

          SHA1

          b55ea3647775752d26e56371f9509bcd02ef585e

          SHA256

          1382f81dcdc0f5741bed088327d00de73a5e9b1d07cd25d6f433fbc1be48b7c5

          SHA512

          b761ca0469398fba6643556afb19981dd1f977f630b207e104c7a17b1dd9918eb4a69d8d3827f6abb61967297ccef71c007e153740c81eda4ec4938abedab2e1

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_SnippingTool_exe

          Filesize

          36KB

          MD5

          bad093419be1135cfe9694ea77088c78

          SHA1

          76204c7ca72cf666add9c9931389d635c82e8af0

          SHA256

          136808af50ee73df9befd76f7aca21765782565b0095227c5a287f3be0b5ef3c

          SHA512

          3b5cb7f80d7cbc557b5a32a995cd607257ac8e56af935ce6f64c54ba1f311a65ef00c69c69047b6eb7bb678c2b1bc0a3c37548aef417ea49e414e1a34bcf651d

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{89ad72d6-51b2-49e9-b0be-df742e152bb2}\0.0.filtertrie.intermediate.txt

          Filesize

          14KB

          MD5

          641b04c0c2e568ecea6d8d29f1e8e9e5

          SHA1

          086d3a349aced38254367eb0c4204637ac06033e

          SHA256

          806d6968803e161fd84c284e60962fe3eaebbb8602554349923453e44297073f

          SHA512

          bdf26098bbdec4fc023a1ce2bcbf6ee595f6381f2a4ede7f87caa8b09381fede8d5530e36dde46c7971398aeb515116ac363f2e30c5879ab3846bd5994b0814a

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{89ad72d6-51b2-49e9-b0be-df742e152bb2}\0.1.filtertrie.intermediate.txt

          Filesize

          5B

          MD5

          34bd1dfb9f72cf4f86e6df6da0a9e49a

          SHA1

          5f96d66f33c81c0b10df2128d3860e3cb7e89563

          SHA256

          8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

          SHA512

          e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{89ad72d6-51b2-49e9-b0be-df742e152bb2}\0.2.filtertrie.intermediate.txt

          Filesize

          5B

          MD5

          c204e9faaf8565ad333828beff2d786e

          SHA1

          7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

          SHA256

          d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

          SHA512

          e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{89ad72d6-51b2-49e9-b0be-df742e152bb2}\Apps.ft

          Filesize

          20KB

          MD5

          6f0c247471743fa91434f295608e4d40

          SHA1

          4a32b7ddf68e58e2a721d32f4d87644f19300dcd

          SHA256

          e957a261ed739a0a98f774ca46a4baa5e0c9b430cacf9df2148da46d6b1d038c

          SHA512

          3b8e42a74571feebd0de63a06265573040b39bad7477b11b38a78d1f67a8e0249697c9320f81b135e79ac852cac880d0f765697332067b8c29433638a542c251

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{89ad72d6-51b2-49e9-b0be-df742e152bb2}\Apps.index

          Filesize

          969KB

          MD5

          ce0751ca5c410f3f0481ed2e7cb40928

          SHA1

          6762aa0996c01966c875d1e4964d02d028ac8347

          SHA256

          2014c67e2d8901281704667ba5229459f5dbef043f22311a0820f9a83b99932d

          SHA512

          cad6ab3048a91ded96e3c172ebb42d1cef90fc9b1fd08c19630b6a033780ec75cd2ae8b87fe9b1d2ddad1b0d1cf697e48d63074acbc81e0f2650601cc587a562

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3ecdbbab-1d92-403b-be51-7cdcbae3859c}\apps.csg

          Filesize

          444B

          MD5

          5475132f1c603298967f332dc9ffb864

          SHA1

          4749174f29f34c7d75979c25f31d79774a49ea46

          SHA256

          0b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd

          SHA512

          54433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3ecdbbab-1d92-403b-be51-7cdcbae3859c}\apps.schema

          Filesize

          150B

          MD5

          1659677c45c49a78f33551da43494005

          SHA1

          ae588ef3c9ea7839be032ab4323e04bc260d9387

          SHA256

          5af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb

          SHA512

          740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3ecdbbab-1d92-403b-be51-7cdcbae3859c}\appsconversions.txt

          Filesize

          1.4MB

          MD5

          2bef0e21ceb249ffb5f123c1e5bd0292

          SHA1

          86877a464a0739114e45242b9d427e368ebcc02c

          SHA256

          8b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307

          SHA512

          f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3ecdbbab-1d92-403b-be51-7cdcbae3859c}\appsglobals.txt

          Filesize

          343KB

          MD5

          931b27b3ec2c5e9f29439fba87ec0dc9

          SHA1

          dd5e78f004c55bbebcd1d66786efc5ca4575c9b4

          SHA256

          541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e

          SHA512

          4ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3ecdbbab-1d92-403b-be51-7cdcbae3859c}\appssynonyms.txt

          Filesize

          237KB

          MD5

          06a69ad411292eca66697dc17898e653

          SHA1

          fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d

          SHA256

          2aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1

          SHA512

          ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133711627311697467.txt

          Filesize

          73KB

          MD5

          6b4901be4969e17d04cf3c1cf77b0d28

          SHA1

          50b317a6779885ffc888eed858d69574a1765361

          SHA256

          5445c9554dc0b4f990d71df1c15c29c02b9cd816ec95396f87f50ccac990b7e0

          SHA512

          65291bff0f7a83b10fb026400378b750ae4a61733bca8079fce1717cbfe6565a18124bdfe02f0079cf9e1135336a1886a14f3317200672571c9022a48db018aa

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

          Filesize

          9KB

          MD5

          f5d489498883e295da60f999664cbcbb

          SHA1

          1764642c5153daca59806a860fc0ae6ddf6a97a0

          SHA256

          93b575551da4675d308869452d3752e46992d62cb91c5e4d31d1abed12711ea0

          SHA512

          bdb89a8d3a029928cb88d2b503c0cd38dd6c5747cddfae538815363787a5aa86c467d7632142237363b1017a776e5f1874f3afb7df0d1fbf725301dcd53fd550

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

          Filesize

          10KB

          MD5

          2fa29fc37b67576e86691c21d188f2a4

          SHA1

          6355f70690e69017c7da89cf6c4e6cfd3deaaec6

          SHA256

          7295a178003769f616071e398e972a05033b800344f9d95d4cb3047a3fc952ab

          SHA512

          9e5c20ca818ef2ab6e7a440ee64e19e736b815715a19cb3f677b5e6a8b634be965b688402680de1ec58b1d8da87c4d394baa471230b42505a66e91f8de490d77

        • memory/1444-69-0x000001A8DCD00000-0x000001A8DCE00000-memory.dmp

          Filesize

          1024KB

        • memory/1444-67-0x000001A8DCD00000-0x000001A8DCE00000-memory.dmp

          Filesize

          1024KB

        • memory/1684-50-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-51-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-55-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-54-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-57-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-56-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-58-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-59-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-60-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-61-0x000002B76A920000-0x000002B76A921000-memory.dmp

          Filesize

          4KB

        • memory/1684-62-0x000002B76A920000-0x000002B76A921000-memory.dmp

          Filesize

          4KB

        • memory/1684-63-0x000002B76A930000-0x000002B76A931000-memory.dmp

          Filesize

          4KB

        • memory/1684-64-0x000002B76A9B0000-0x000002B76A9B1000-memory.dmp

          Filesize

          4KB

        • memory/1684-65-0x000002B76A9B0000-0x000002B76A9B1000-memory.dmp

          Filesize

          4KB

        • memory/1684-52-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-53-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-48-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-46-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-49-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-0-0x000002B762470000-0x000002B762480000-memory.dmp

          Filesize

          64KB

        • memory/1684-47-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-45-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-44-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-43-0x000002B76A910000-0x000002B76A911000-memory.dmp

          Filesize

          4KB

        • memory/1684-42-0x000002B76A8F0000-0x000002B76A8F1000-memory.dmp

          Filesize

          4KB

        • memory/1684-41-0x000002B76A8F0000-0x000002B76A8F1000-memory.dmp

          Filesize

          4KB

        • memory/1684-37-0x000002B76A8E0000-0x000002B76A8E1000-memory.dmp

          Filesize

          4KB

        • memory/1684-39-0x000002B76A8E0000-0x000002B76A8E1000-memory.dmp

          Filesize

          4KB

        • memory/1684-40-0x000002B76A8F0000-0x000002B76A8F1000-memory.dmp

          Filesize

          4KB

        • memory/1684-35-0x000002B76A7A0000-0x000002B76A7A1000-memory.dmp

          Filesize

          4KB

        • memory/1684-17-0x000002B762580000-0x000002B762590000-memory.dmp

          Filesize

          64KB