Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
x64a (1).rar
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x64a (1).rar
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Readme.txt
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Readme.txt
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
x64a.rpf
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
x64a.rpf
Resource
win10v2004-20230915-en
General
-
Target
x64a.rpf
-
Size
46.5MB
-
MD5
edfbe6855ec32a21a698abc27a899341
-
SHA1
fbf10d78e164e0e054f04ab23279dd992ff13c86
-
SHA256
0851ab916bbf058124cf1160683af12f8ffc544f4daedc030aac1c7925e99d94
-
SHA512
5d13e0c0750c34c136d778b0ead61a8b3dbe1210b1ca8acd2a0c19b5879d3acf37e776c7a745f0e052b32c782d1983c259fc2f39517149e1cea1bd13fb97d5e0
-
SSDEEP
786432:o6VoH3pvrR5NilJ/QM8ZK7A09Nn5RnqOPpM8BV511TNwm44Ew2LQPN6dwU/HKIrK:o6VoH3pvrRPq/QMV7AMbZBVDbVjEw2pO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\.rpf rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\.rpf\ = "rpf_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\rpf_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\rpf_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\rpf_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\rpf_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\rpf_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\rpf_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2556 AcroRd32.exe 2556 AcroRd32.exe 2556 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1880 1260 cmd.exe 29 PID 1260 wrote to memory of 1880 1260 cmd.exe 29 PID 1260 wrote to memory of 1880 1260 cmd.exe 29 PID 1880 wrote to memory of 2556 1880 rundll32.exe 30 PID 1880 wrote to memory of 2556 1880 rundll32.exe 30 PID 1880 wrote to memory of 2556 1880 rundll32.exe 30 PID 1880 wrote to memory of 2556 1880 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\x64a.rpf1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\x64a.rpf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\x64a.rpf"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56aeeb7bc7829b9de4f7034aaf123cad6
SHA18a482dba40bc8d2f207a5d0a95812b67a4960564
SHA2569fed80690e53d10809f5e9254afd6cf7db237cfd8ec14fd7262f8c2c1373b5f5
SHA51258b75989d48d77d79a2eaab8c8d8dc29b946ff9fa5b80758cb7ceef5b1c8cdebb9aa1ebd3c335478734c636ae83693164882e3164b890190ab32f993c81caf33