Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
x64a (1).rar
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x64a (1).rar
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Readme.txt
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Readme.txt
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
x64a.rpf
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
x64a.rpf
Resource
win10v2004-20230915-en
General
-
Target
x64a (1).rar
-
Size
45.6MB
-
MD5
003c32712610e2da9b098119343c926e
-
SHA1
0a5600ed00d18a1b321037ce2cd0308f6dc01494
-
SHA256
3392bb3ef0c4dfda9bd2f11710d4b6b3d94e94f475ac9a01fb579399fc1de18e
-
SHA512
854706c22911a2d5a3151525716efab68c6f965febd1faee083ea7e26d2575b1c6bb4f26195c602c7f57931a09ff02cd328bcc400f2bf548ab68521d6e17912f
-
SSDEEP
786432:yVCwLT4XPSp2+0EEvTb15hB+sTsxaqkT0KPIGL/Qo9tASYfxaG3++Kr:y4/MN0BTbnlfqQ5L/QomsAB2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2760 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe 2760 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2888 1316 cmd.exe 29 PID 1316 wrote to memory of 2888 1316 cmd.exe 29 PID 1316 wrote to memory of 2888 1316 cmd.exe 29 PID 2888 wrote to memory of 2760 2888 rundll32.exe 30 PID 2888 wrote to memory of 2760 2888 rundll32.exe 30 PID 2888 wrote to memory of 2760 2888 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\x64a (1).rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\x64a (1).rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\x64a (1).rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2760
-
-