Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/05/2023, 19:09

230507-xt4dssfe62 3

07/05/2023, 19:04

230507-xq8jcahc8x 3

07/05/2023, 19:01

230507-xpdmkshc71 10

Analysis

  • max time kernel
    151s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2023, 19:04

General

  • Target

    empty.jpg

  • Size

    55KB

  • MD5

    f7796b4270e876b8acf653c1632f2626

  • SHA1

    e8fbb0a599801f8698dd4753e390294614bfe833

  • SHA256

    b095ef14c5f8a5fdab59b407ae3117a942928b361a2af0a574e3046431f9f907

  • SHA512

    3cc5ef085f4784d3416cdd94415e02fe4cd6e445eff7c3c85d7daa2d039a5ad2f053cd1960b9c13c818ca67abc77304d2bb0caa6565f0687d788a525945dcb64

  • SSDEEP

    1536:DfJMSeftY5lmSF6KQtsh/tjXCiFyUNien:rotEdFV7fLFxhn

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\empty.jpg
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:628
  • C:\Windows\System32\cmd.exe
    "C:\Windows\System32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\system32\net.exe
      net user administrator /active:yes
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1372
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 user administrator /active:yes
        3⤵
          PID:856
      • C:\Windows\system32\shutdown.exe
        shutdown /l
        2⤵
          PID:940
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:1720
        • C:\Windows\system32\csrss.exe
          %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
          1⤵
          • Enumerates system info in registry
          • Suspicious use of WriteProcessMemory
          PID:1708
        • C:\Windows\system32\winlogon.exe
          winlogon.exe
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1528
          • C:\Windows\system32\sethc.exe
            sethc.exe 211
            2⤵
              PID:1908

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/628-54-0x0000000001B40000-0x0000000001B41000-memory.dmp

            Filesize

            4KB

          • memory/628-55-0x0000000001B40000-0x0000000001B41000-memory.dmp

            Filesize

            4KB

          • memory/1528-57-0x00000000026E0000-0x00000000026E1000-memory.dmp

            Filesize

            4KB

          • memory/1528-58-0x00000000026E0000-0x00000000026E1000-memory.dmp

            Filesize

            4KB

          • memory/1720-56-0x0000000002840000-0x0000000002841000-memory.dmp

            Filesize

            4KB

          • memory/1908-59-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB