Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
FileSetupThere+.rar
Resource
win7-20230220-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
FileSetupThere+.rar
Resource
win10v2004-20230220-en
3 signatures
150 seconds
General
-
Target
FileSetupThere+.rar
-
Size
15.0MB
-
MD5
b60ee47ca52121cfa03fc19213b18ab2
-
SHA1
6c8c8537547e5ab76bbf4451818d6eccb6311219
-
SHA256
e63738463dcbc69fd4a7e7df7702b2a9453cb315290ad577e662d804fa6a3d97
-
SHA512
fbbd98261888c21e036001dc64b9ef13ec4e957e31578433a515bcedfab87992f5fd1fc1c74fef62cb6ffb18cac0cc34c2b4eaa9321acedfdc5ab796dc4a883a
-
SSDEEP
393216:KanehXz9RZ9YMwjXj+WfGesT5bU2jmYhO1c:NnOJRz2SWfG5RKkZ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1772 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1772 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe 1772 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1772 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1176 1252 cmd.exe 27 PID 1252 wrote to memory of 1176 1252 cmd.exe 27 PID 1252 wrote to memory of 1176 1252 cmd.exe 27 PID 1176 wrote to memory of 1772 1176 rundll32.exe 28 PID 1176 wrote to memory of 1772 1176 rundll32.exe 28 PID 1176 wrote to memory of 1772 1176 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FileSetupThere+.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\FileSetupThere+.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\FileSetupThere+.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1772
-
-