Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

19/08/2023, 23:20

230819-3bvxlaeb8w 3

19/08/2023, 23:16

230819-29gbeseb8s 3

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-es
  • resource tags

    arch:x64arch:x86image:win7-20230712-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    19/08/2023, 23:16

General

  • Target

    $RW1REED.exe

  • Size

    107KB

  • MD5

    e3d9ef62637eac3f4ebb16a6fd3975bf

  • SHA1

    100ce9fced427d0915f209b10be0b0537c90c5fa

  • SHA256

    f01a68053b552c4c8c1cacdcc4139c5b3582acc308dfbe4959ad4b86ec7e3519

  • SHA512

    b2ef5012e71bbda23d6f618678acc35c630832c95c12fd28b0b12a32ba40c5470775bb68ccfde030768cbe20fce40c9c964a123e7830f99817216271bae09cc7

  • SSDEEP

    1536:5DpkChv8LHbXWn8Zhh8in7Jqn+k+bkky5Me6t:0CV83mn8hhvn7Jq+k+bkkZe6t

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$RW1REED.exe
    "C:\Users\Admin\AppData\Local\Temp\$RW1REED.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1772-54-0x0000000000E10000-0x0000000000E32000-memory.dmp

    Filesize

    136KB

  • memory/1772-55-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1772-56-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB

  • memory/1772-57-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB

  • memory/1772-58-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1772-59-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB

  • memory/1772-60-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB

  • memory/1772-61-0x0000000008DE0000-0x0000000008DE1000-memory.dmp

    Filesize

    4KB

  • memory/1772-62-0x0000000008E80000-0x0000000008E82000-memory.dmp

    Filesize

    8KB

  • memory/1772-63-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB

  • memory/1772-64-0x00000000744F0000-0x0000000074BDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1772-65-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB