Analysis
-
max time kernel
194s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 13:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
TRISHA 2023-ORGANIZER.zip
Resource
win10v2004-20240802-en
5 signatures
300 seconds
General
-
Target
TRISHA 2023-ORGANIZER.zip
-
Size
63.6MB
-
MD5
c7ea49d2e4bc427f842426b4905d940a
-
SHA1
352322fceb2d759d679d922b71d43c8982afa13e
-
SHA256
175669f4fea886c87ae6d0310db68ce4959535dc5fbe957509512fc5527c72d3
-
SHA512
3fa6b4fc4c68fa3a7b3ae6e1974a850d1f85e2644b7c63a1cbe608457b684c0b8054bd595cc2989084d01252ed4718bb32859bc6541b10d3221598843429f54e
-
SSDEEP
1572864:QaSHLIPjbXR3Bf8gT4I/+K/A2KlVuSr50dhGbVVM5z:QaULIPfB3B7/r/WVui50Ft
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\U: mstsc.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3220 mstsc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3220 mstsc.exe 3220 mstsc.exe 3220 mstsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3220 mstsc.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\TRISHA 2023-ORGANIZER.zip"1⤵PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:1124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5104
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3220