Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
75j1yFYZ7wftOfBeB
windows7-x64
15j1yFYZ7wftOfBeB
windows10-2004-x64
16ulq7PkQ4jMa3CG3
windows7-x64
16ulq7PkQ4jMa3CG3
windows10-2004-x64
17UKgaRjbLtj7Nmd3
windows7-x64
17UKgaRjbLtj7Nmd3
windows10-2004-x64
1EUlp3EBVoZzDusIE
windows7-x64
1EUlp3EBVoZzDusIE
windows10-2004-x64
1FwNX79XwxL713ubH
windows7-x64
1FwNX79XwxL713ubH
windows10-2004-x64
1IgXYrHdIyByyYZ23
windows7-x64
1IgXYrHdIyByyYZ23
windows10-2004-x64
1IxpMALudDFwYVaf5
windows7-x64
1IxpMALudDFwYVaf5
windows10-2004-x64
1JqEzfGnwc8hnAIwY
windows7-x64
1JqEzfGnwc8hnAIwY
windows10-2004-x64
1LEMqqtVPF49FmZ7W
windows7-x64
1LEMqqtVPF49FmZ7W
windows10-2004-x64
1RuntimeIni...s.json
windows7-x64
3RuntimeIni...s.json
windows10-2004-x64
3ScriptingA...s.json
windows7-x64
3ScriptingA...s.json
windows10-2004-x64
3System.Dat...es.dat
windows7-x64
3System.Dat...es.dat
windows10-2004-x64
3URodfDhi1apVS2I5
windows7-x64
1URodfDhi1apVS2I5
windows10-2004-x64
1UnityServi...n.json
windows7-x64
3UnityServi...n.json
windows10-2004-x64
3V21k9r3Ax9VAZivr
windows7-x64
1V21k9r3Ax9VAZivr
windows10-2004-x64
1VBpk2rQvTZJtfs5Y
windows7-x64
1VBpk2rQvTZJtfs5Y
windows10-2004-x64
1Analysis
-
max time kernel
153s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 09:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5j1yFYZ7wftOfBeB
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5j1yFYZ7wftOfBeB
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
6ulq7PkQ4jMa3CG3
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
6ulq7PkQ4jMa3CG3
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
7UKgaRjbLtj7Nmd3
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
7UKgaRjbLtj7Nmd3
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
EUlp3EBVoZzDusIE
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
EUlp3EBVoZzDusIE
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
FwNX79XwxL713ubH
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
FwNX79XwxL713ubH
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
IgXYrHdIyByyYZ23
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
IgXYrHdIyByyYZ23
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
IxpMALudDFwYVaf5
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
IxpMALudDFwYVaf5
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
JqEzfGnwc8hnAIwY
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
JqEzfGnwc8hnAIwY
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
LEMqqtVPF49FmZ7W
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
LEMqqtVPF49FmZ7W
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
RuntimeInitializeOnLoads.json
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
RuntimeInitializeOnLoads.json
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
ScriptingAssemblies.json
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
ScriptingAssemblies.json
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
System.Data.dll-resources.dat
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
System.Data.dll-resources.dat
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
URodfDhi1apVS2I5
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
URodfDhi1apVS2I5
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
UnityServicesProjectConfiguration.json
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
UnityServicesProjectConfiguration.json
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
V21k9r3Ax9VAZivr
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
V21k9r3Ax9VAZivr
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
VBpk2rQvTZJtfs5Y
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
VBpk2rQvTZJtfs5Y
Resource
win10v2004-20230915-en
General
-
Target
ScriptingAssemblies.json
-
Size
4KB
-
MD5
f32d760eadbea1f7cce100cdb4f907da
-
SHA1
bc756e9a885c58dcf2f90e9cdc6857c03fcc6ef2
-
SHA256
2282eb71ba3d38f79e47a5bf4970a0595c3df03eda4aa04c5e40fdf0a2be80fe
-
SHA512
6a865094c1dee48d00d32176bac6bf4b53c3746e5ed914cd3e7ff5ff07940ac19f426c124225d532041daf21e7c7549f1d8d1857382c42ea1287d13cb0c6ba7b
-
SSDEEP
48:YXNxXrj3RlClouNuQGoSfTG/xupYxIzeuTTrk2K:MjhlMouNt5uaxI3PrFK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2840 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2840 AcroRd32.exe 2840 AcroRd32.exe 2840 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2640 2036 cmd.exe 29 PID 2036 wrote to memory of 2640 2036 cmd.exe 29 PID 2036 wrote to memory of 2640 2036 cmd.exe 29 PID 2640 wrote to memory of 2840 2640 rundll32.exe 30 PID 2640 wrote to memory of 2840 2640 rundll32.exe 30 PID 2640 wrote to memory of 2840 2640 rundll32.exe 30 PID 2640 wrote to memory of 2840 2640 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ScriptingAssemblies.json1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ScriptingAssemblies.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ScriptingAssemblies.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD541f6eeb72a96ef8417501fe3b964f781
SHA1ebad0c363dbcdefb7b2241f94888a72fb263ba0a
SHA256190eae339dccf15753ee846d4e8576867dcbdf43b3a82625b351de4736168ea8
SHA512bc5d8e499472c7a11d11389a4a96160f55918ea74a9a7da7643ea67fdc4a824fa1ee7867a77485486481e65a4bc1de5438410e0be28f3459c7694961b249d29a