Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
fef73528a083d1c07ea0fce5a85fcc2e.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fef73528a083d1c07ea0fce5a85fcc2e.jad
Resource
win10v2004-20231222-en
General
-
Target
fef73528a083d1c07ea0fce5a85fcc2e.jad
-
Size
339KB
-
MD5
fef73528a083d1c07ea0fce5a85fcc2e
-
SHA1
4046abfef2431c80f3fdf21bff837dafd118fd16
-
SHA256
51d3064dd9f948354e1cccc42de2e30e20e18d2040fda9c700557d30d920ea8d
-
SHA512
ff90b9b1875f3582a74b66d06a70fd1e162f793da3cafe4453a8ba96be70370b12990a31fa6cbac29d53095ea18a25b7a0f0ea877376d74f1316ea4dfb40636d
-
SSDEEP
6144:YdvCDTWmS7dX8mq5RKvfbbhePhr2wxUsAAVxu3lROh48JRy:uvG6mSN8UTbgPMwxU10u3bu45
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 AcroRd32.exe 2816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2444 2968 cmd.exe 29 PID 2968 wrote to memory of 2444 2968 cmd.exe 29 PID 2968 wrote to memory of 2444 2968 cmd.exe 29 PID 2444 wrote to memory of 2816 2444 rundll32.exe 30 PID 2444 wrote to memory of 2816 2444 rundll32.exe 30 PID 2444 wrote to memory of 2816 2444 rundll32.exe 30 PID 2444 wrote to memory of 2816 2444 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fef73528a083d1c07ea0fce5a85fcc2e.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fef73528a083d1c07ea0fce5a85fcc2e.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fef73528a083d1c07ea0fce5a85fcc2e.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c3d09e136c8adc85677ba6a2c3b8b530
SHA195e516be167f732a2cf06be27838646d13d5fbba
SHA2566a610578151069f90084badf5df7efc8417e27460d3fff9706d3b9137eca750c
SHA5122b8012bf5ca8fd1005bc37564ad82610345ddb862e4e27fbda4cd3b8489f62e9fdcedbcd0e1ad2d7c3840da309041d9616d20a3e92c6c1710b4640e91991825f