Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/01/2023, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
Compiled_Project.rar
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Compiled_Project.rar
Resource
win10v2004-20220901-en
General
-
Target
Compiled_Project.rar
-
Size
53KB
-
MD5
75f365b7a47efe16eeec9d5aa8422bfe
-
SHA1
7bb830fffef7f76df24db8575175950be207b9de
-
SHA256
14ac25415d9f1c8ceaeab7be358750490b752f121e0ae4f0919d98a98b1b8b17
-
SHA512
7d7302b3452657e4e31be63ec72e6e4d0eea8c9a5579c6ed24572b1fe3fce721592a6b1b024999abaf6910b334e166c8fece9d38eac2b10123f25adffcc6c32d
-
SSDEEP
1536:hVXrfe7Pbk9BHZKOY9az949oHDJOMXnJGKscWGlJ:hVjeDbk3Uw+YJOM3JGKIQJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 580 1432 cmd.exe 29 PID 1432 wrote to memory of 580 1432 cmd.exe 29 PID 1432 wrote to memory of 580 1432 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Compiled_Project.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Compiled_Project.rar2⤵
- Modifies registry class
PID:580
-