Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/11/2023, 06:30
231103-g9z4badc91 302/11/2023, 12:53
231102-p4vkmsea68 302/11/2023, 09:44
231102-lqmfbsab7t 402/11/2023, 09:42
231102-lpk6wacb46 3Analysis
-
max time kernel
302s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-de -
resource tags
arch:x64arch:x86image:win7-20231023-delocale:de-deos:windows7-x64systemwindows -
submitted
02/11/2023, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
Resource
win7-20231023-de
Behavioral task
behavioral2
Sample
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
Resource
win10v2004-20231020-de
General
-
Target
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
-
Size
4KB
-
MD5
e973b79a9978a02dfa2a5e6d4e35a0b6
-
SHA1
9f74c6c2c15cb9ca687e6517abbff6a1c9dcdcdd
-
SHA256
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8
-
SHA512
b9e977ed0adb1e1164e048ba754eebfecb5b405af7c4ed17f9ffde26abb63c07430abb2303bc412c9575e5e2f1a6bf19576f2aff7c402b11a85be3a6c4c927a6
-
SSDEEP
96:GLtsm7/IunhSgLesUoj2LWEU4kn689MnOC9AQssv+MnEn9nunoqnwnXDI+LF:4Qunh+9oMWEenJMnOC9Zssv+MnEn9nuq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\.bin rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\bin_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2536 AcroRd32.exe 2536 AcroRd32.exe 2536 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2604 2924 cmd.exe 29 PID 2924 wrote to memory of 2604 2924 cmd.exe 29 PID 2924 wrote to memory of 2604 2924 cmd.exe 29 PID 2604 wrote to memory of 2536 2604 rundll32.exe 30 PID 2604 wrote to memory of 2536 2604 rundll32.exe 30 PID 2604 wrote to memory of 2536 2604 rundll32.exe 30 PID 2604 wrote to memory of 2536 2604 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57d929bda83535b25d524af5d615ad514
SHA198036b12dff307457b33b5cf62cb20cf73cee87e
SHA256dc118ac083f05b5ba89412c5d55c900916bae5c0ac8438aa80dab31ccfb2b614
SHA5126aa888296790b362a952d7dc9bda1670a40e05daa13a69b555f711eba8f372ea4f9a4c5b730133ef8bc45c4cee0f50104174143e38d74878f2d9f3995942590c