Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    601s
  • max time network
    409s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2023, 01:12 UTC

General

  • Target

    data.win

  • Size

    206.6MB

  • MD5

    2413d9da384f8d0ee4e2f2284663ecba

  • SHA1

    701e740b89d4305e0bc491c8477f44999869c16b

  • SHA256

    3996940b4df8931e5d54d6caf4b4afb98f0f9866fdf584fc9a0b01baaeb49d0f

  • SHA512

    5137e107b2de176bf364d06d29c025f380aa06dbb1d48ca49689c39ffcd7f020f18a0b97172314da2df8c105323d882a9a8f1572ab01a0204e873086c46e63b3

  • SSDEEP

    6291456:HxIH1baWonxWaVN7qHD0awRuV20fiXn8P/8O4SOEY:KHJQn4gqHDjwRFLO4vEY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\data.win
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\data.win
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data.win"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1376-82-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB

  • memory/1448-54-0x000007FEFBD81000-0x000007FEFBD83000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.