Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    601s
  • max time network
    361s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 17:14

General

  • Target

    rules/emerging-misc.rules

  • Size

    20KB

  • MD5

    6beaec5e9d73fad13654da38a9bfe16d

  • SHA1

    a5ea3ffd936066719199fc211fe227e6295816ec

  • SHA256

    bf9dcae244a343a55378617667268546a24ad1710fbef304129f1843a74dd0b4

  • SHA512

    570f3d582ca4dbcca51563d956ea148a6055379fde07120a42bc4d5b285972cd4f8c97e94232e08a33aa1f89a19a15955616d2f5e949ed9e483c6a5d48b776f5

  • SSDEEP

    384:xPrs2rs/+TFwJwi3er6M/EssVgUr1+nILofgfwfgyJX2c8zdnPhfSFl7nqFYCFUz:xPn3TFwJwIer7sssVgUr1+ILofgfwfgw

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\rules\emerging-misc.rules
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rules\emerging-misc.rules
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rules\emerging-misc.rules"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    20850d504e35d15daabf52873208d875

    SHA1

    45389c76e8403ebb59b90cfd5861c0f8b697e310

    SHA256

    59d1b35aed036735b579979e232097b7316ed712b6c896db3778d41e73e5ae70

    SHA512

    932c25334725613b6756a89a5436c8d66057eef2fe3775ff9043135a14a29d3ef82f11eecaccbd78773f08b2444c2dba1891f6e3bd8cc269bbc0441f367dc8a3