Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/11/2023, 06:30
231103-g9z4badc91 302/11/2023, 12:53
231102-p4vkmsea68 302/11/2023, 09:44
231102-lqmfbsab7t 402/11/2023, 09:42
231102-lpk6wacb46 3Analysis
-
max time kernel
39s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20231023-de -
resource tags
arch:x64arch:x86image:win7-20231023-delocale:de-deos:windows7-x64systemwindows -
submitted
02/11/2023, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
Resource
win7-20231023-de
Behavioral task
behavioral2
Sample
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
Resource
win10v2004-20231020-de
General
-
Target
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
-
Size
4KB
-
MD5
e973b79a9978a02dfa2a5e6d4e35a0b6
-
SHA1
9f74c6c2c15cb9ca687e6517abbff6a1c9dcdcdd
-
SHA256
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8
-
SHA512
b9e977ed0adb1e1164e048ba754eebfecb5b405af7c4ed17f9ffde26abb63c07430abb2303bc412c9575e5e2f1a6bf19576f2aff7c402b11a85be3a6c4c927a6
-
SSDEEP
96:GLtsm7/IunhSgLesUoj2LWEU4kn689MnOC9AQssv+MnEn9nunoqnwnXDI+LF:4Qunh+9oMWEenJMnOC9Zssv+MnEn9nuq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\bin_auto_file\ = "exc" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\.bin rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\bin_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 AcroRd32.exe 2476 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2888 2764 cmd.exe 28 PID 2764 wrote to memory of 2888 2764 cmd.exe 28 PID 2764 wrote to memory of 2888 2764 cmd.exe 28 PID 2888 wrote to memory of 2476 2888 rundll32.exe 31 PID 2888 wrote to memory of 2476 2888 rundll32.exe 31 PID 2888 wrote to memory of 2476 2888 rundll32.exe 31 PID 2888 wrote to memory of 2476 2888 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin"3⤵
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bb2394abceaee2b8a2ae43d45687b426
SHA168879cbe145eac932e4940d74db0cffa04435a6b
SHA256db5a7fe93e8180a85d39d71465ec621743f683d97995a82c6ac07c40c9faa9c5
SHA5125e503ac0e63dadc03fd073c2ac6e536de2c559a72f8a8f0ac4d6fac453cc21c6efdd24d82efec0baae97f1ca5e2efba7a30badc74a32d188b44257bfff68fa99