Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
PersonalMessenger.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
PersonalMessenger.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral3
Sample
baseline.prof
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
baseline.prof
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
baseline.profm
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
baseline.profm
Resource
win10v2004-20230915-en
General
-
Target
baseline.prof
-
Size
1006B
-
MD5
47a763921d0d7995e9b560ce2bde6dd5
-
SHA1
f6c2fb0207ddd20ba37ea89bd3617bac1d557fd1
-
SHA256
602367f4c57f1eefbfe872e9eb49f369a8ebd7ad4a5ce39a3601a1604ddd92e8
-
SHA512
c86543734fc0d627816a453a1bf13ef71718abedb682e3a04849aabe6dd719fce1cd07e8a35d17d33b218ff749718789f9166d893cfed4be635543ab69aa1db6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\prof_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\.prof rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\prof_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\prof_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\prof_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\.prof\ = "prof_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\prof_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\prof_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 AcroRd32.exe 2616 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1576 2408 cmd.exe 29 PID 2408 wrote to memory of 1576 2408 cmd.exe 29 PID 2408 wrote to memory of 1576 2408 cmd.exe 29 PID 1576 wrote to memory of 2616 1576 rundll32.exe 30 PID 1576 wrote to memory of 2616 1576 rundll32.exe 30 PID 1576 wrote to memory of 2616 1576 rundll32.exe 30 PID 1576 wrote to memory of 2616 1576 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\baseline.prof1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\baseline.prof2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\baseline.prof"3⤵
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fa64bd3e5405a0c885c1365385aa1433
SHA1cba763a709f91f42d99ce62d12459765f51c60c9
SHA256c7e88cc9bb10f6bd7f5086fa19240bec0195ee6cb9a573b826f131a6e8a73a31
SHA512a1165e0b4090260cc55079c6d17ff27f7e26cfc8e8727a6cd60670990de3882b92e9f9825bec5910e9b10d592f37f8789a1b930ed824f2c40f94c1675626f1a0