Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
View _Document_Hhtm.html_
Resource
win7-20231023-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
View _Document_Hhtm.html_
Resource
win10v2004-20231025-en
3 signatures
150 seconds
General
-
Target
View _Document_Hhtm.html_
-
Size
9B
-
MD5
8f27d7a768ffa9ea267e4da2ce6840e3
-
SHA1
41d4e5cb54fe14d971c683b0ca3625f3fa371ceb
-
SHA256
bbcc63918dca4235d53a8aeba75b718c38f95369e4285c90fa05ddef0b6851e4
-
SHA512
99047a0ce4a51e0ea319a902a49562876e203443ad6b18029bc93575e55a8f374ff0f38ebe5a7a0e5cec71e4119cd8112d4c622ed695bf5d3f31fc783fcb5720
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\html__auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\html__auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\html__auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.html_ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.html_\ = "html__auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\html__auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\html__auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\html__auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1040 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1040 AcroRd32.exe 1040 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1924 2180 cmd.exe 29 PID 2180 wrote to memory of 1924 2180 cmd.exe 29 PID 2180 wrote to memory of 1924 2180 cmd.exe 29 PID 1924 wrote to memory of 1040 1924 rundll32.exe 30 PID 1924 wrote to memory of 1040 1924 rundll32.exe 30 PID 1924 wrote to memory of 1040 1924 rundll32.exe 30 PID 1924 wrote to memory of 1040 1924 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\View _Document_Hhtm.html_"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\View _Document_Hhtm.html_2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\View _Document_Hhtm.html_"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1040
-
-