Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/03/2023, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
IMG_9715.heic
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
IMG_9715.heic
Resource
win10v2004-20230220-en
General
-
Target
IMG_9715.heic
-
Size
1.3MB
-
MD5
eb4190d50458289116b15a11fb0d0cb7
-
SHA1
1e3af914792b4e71a93bdeee7eecc71eae8e4fe0
-
SHA256
51f352fdb2535cb5333114e1de3fe12eaf56e3a771327f438a0f72e7f1b156a9
-
SHA512
6a7bfaf5466dd617ef5a93185e2125f3eedb0c25eec1d52d34d8621c1a1b5f5101c450579bb00890872fa2d2dd7a56711a1a70906e36fc2a967b7ec377ffcdfc
-
SSDEEP
24576:Z36zpSfRRJz3PgtNhCGXt7Mz2Q2zgBrcNyGxpNBE5zLUwUnocSW:Z3gSJHz/gbhCIMaQ2kBwNVAf5K
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\heic_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\heic_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.heic\ = "heic_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\heic_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\heic_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.heic rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\heic_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\heic_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1700 AcroRd32.exe 1700 AcroRd32.exe 1700 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1064 wrote to memory of 584 1064 cmd.exe 28 PID 1064 wrote to memory of 584 1064 cmd.exe 28 PID 1064 wrote to memory of 584 1064 cmd.exe 28 PID 584 wrote to memory of 1700 584 rundll32.exe 29 PID 584 wrote to memory of 1700 584 rundll32.exe 29 PID 584 wrote to memory of 1700 584 rundll32.exe 29 PID 584 wrote to memory of 1700 584 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\IMG_9715.heic1⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\IMG_9715.heic2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\IMG_9715.heic"3⤵
- Suspicious use of SetWindowsHookEx
PID:1700
-
-