Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/11/2023, 06:30
231103-g9z4badc91 302/11/2023, 12:53
231102-p4vkmsea68 302/11/2023, 09:44
231102-lqmfbsab7t 402/11/2023, 09:42
231102-lpk6wacb46 3Analysis
-
max time kernel
300s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-de -
resource tags
arch:x64arch:x86image:win7-20231020-delocale:de-deos:windows7-x64systemwindows -
submitted
03/11/2023, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
Resource
win7-20231020-de
Behavioral task
behavioral2
Sample
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
Resource
win10v2004-20231023-de
General
-
Target
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin
-
Size
4KB
-
MD5
e973b79a9978a02dfa2a5e6d4e35a0b6
-
SHA1
9f74c6c2c15cb9ca687e6517abbff6a1c9dcdcdd
-
SHA256
861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8
-
SHA512
b9e977ed0adb1e1164e048ba754eebfecb5b405af7c4ed17f9ffde26abb63c07430abb2303bc412c9575e5e2f1a6bf19576f2aff7c402b11a85be3a6c4c927a6
-
SSDEEP
96:GLtsm7/IunhSgLesUoj2LWEU4kn689MnOC9AQssv+MnEn9nunoqnwnXDI+LF:4Qunh+9oMWEenJMnOC9Zssv+MnEn9nuq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2332 AcroRd32.exe 2332 AcroRd32.exe 2332 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2788 1876 cmd.exe 29 PID 1876 wrote to memory of 2788 1876 cmd.exe 29 PID 1876 wrote to memory of 2788 1876 cmd.exe 29 PID 2788 wrote to memory of 2332 2788 rundll32.exe 30 PID 2788 wrote to memory of 2332 2788 rundll32.exe 30 PID 2788 wrote to memory of 2332 2788 rundll32.exe 30 PID 2788 wrote to memory of 2332 2788 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin1⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\861e4a131e892de342b354fce749e4e770c83c246ef74047721b5854394cf7e8.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b1475df27374573d3047274f2902c129
SHA14b0d90afc53364502fda250acb8b897c55f696e2
SHA2565799a7ef1bbd495d1b8ccb25be5af108e9bb64be3bf9376e6f6b7324c3c531a2
SHA5123e386536e87ef296d624a09b8ab64c490c3850189406d940c8527d8dd39ed9f74b270816b19f674cd3f99f9379695decf3e8634006c2bf9081bade74a6083f61