Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 20:10

General

  • Target

    image005.gz

  • Size

    2KB

  • MD5

    afc9d946caf54a2dfeef9d0aa8e47c38

  • SHA1

    2fbaf78ded8beef5e620f94c0c35d92ff6a8decc

  • SHA256

    8d5599a2f2f228730787db9cce91c745798fc12034b167f5318ddd0c1b656167

  • SHA512

    4fa8567c8b651d0738f6b4b2e802d44159a59eda3ee6ae9115e35e7228b3d68d38f6d2c5486dd76e76567dcff37926f7a6833b38203c526947866b89e5629778

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\image005.gz
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\image005.gz
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" "C:\Users\Admin\AppData\Local\Temp\image005.gz"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2412
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2656-25-0x00000000035C0000-0x00000000035D0000-memory.dmp

      Filesize

      64KB

    • memory/2656-24-0x00000000035B0000-0x00000000035B1000-memory.dmp

      Filesize

      4KB

    • memory/2656-26-0x00000000035B0000-0x00000000035B1000-memory.dmp

      Filesize

      4KB