Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    600s
  • max time network
    369s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 17:14

General

  • Target

    rules/emerging-netbios.rules

  • Size

    328KB

  • MD5

    40a3cdb3f479ecf0e7564adc05ff427f

  • SHA1

    d27c36373586b8aa7325be82e8f67b112caad481

  • SHA256

    effd715ed61a9868e5d6eff2108d935c22873a8a2701cee7d92fa6cb09de110a

  • SHA512

    3be1d0726e9ec48b79c53542a4250747fbddc5253b1526d333fcf249c5b04927626f6c7848a42a6c28dd8006e2f0013a845e6da4ea2f418e90ff43d7f812b797

  • SSDEEP

    1536:xPnBPHiCS5JknebKhc/7J6sbK7MgDAkkJMiO5y91mMcVb6ulf2bVT:pnVHgQnebKhc/rO5y91mM6bblfGl

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\rules\emerging-netbios.rules
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rules\emerging-netbios.rules
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rules\emerging-netbios.rules"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    75cc2b98c255000f26a4105265932c47

    SHA1

    7367f74ccddbae55ab9a2a54647b59f17b2eabc6

    SHA256

    145dd5c9466d8b0ea4b2f7d35b0aa04323a83e981ce346af4561910de9b3b00c

    SHA512

    a6fe037b1f94d89d926fa96443650f220d8a2040bc4e2a528f6b86aa953d0595feff82753cb2f034b1fdd2e2682481cba344237536267edd6da9b50fefbc6ab0