Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    218s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    04/08/2023, 14:38

General

  • Target

    Upload/admin/modules/tools/maillogs.php

  • Size

    14KB

  • MD5

    200f41f3e92a1e07d18f0d3466caeb7a

  • SHA1

    ad219dc4289613ff49a512397314d6e83efacc83

  • SHA256

    34426168bf0f3c6ac7e284edfbd20514541ac2e3a65d4d31e90a262e55a894b6

  • SHA512

    4624d019009cc73e4eb9aa1a306e68047c1a3c51a91db592c70640ff0d7a5625a865843ae465ba8dda7d7fe36d6d831916a8d7ed5008ab072673564141af39f2

  • SSDEEP

    384:17cZcc57rihdGiDFAXXY1Qv2JCxFA1iIyUVhJ96d8Kafbon7KV6c7ErS54SLcB8c:1ymde+ei5YUFaQzU7KV7rA3+bj7GxX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Upload\admin\modules\tools\maillogs.php
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Upload\admin\modules\tools\maillogs.php
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Upload\admin\modules\tools\maillogs.php"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4fafe5666474d1dd613373271a139f6d

    SHA1

    8db7e74d7d0ed5900f35cd2783b8c8633156658f

    SHA256

    a18f891ad3ddda286f24da86814686d60bd78f9cc29a66949ad9a1b8512cfbac

    SHA512

    8b7b93729289b489af35cdb8b4a377c15c53fbc7f6418f869d8c9eaccc89c73889066e899e09def56750820f6f8c66e4ea05d20e6873b66b1405bfe376e37cd3