Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
0cbc37f4e91557c54dc93428720301c7.jad
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cbc37f4e91557c54dc93428720301c7.jad
Resource
win10v2004-20231215-en
General
-
Target
0cbc37f4e91557c54dc93428720301c7.jad
-
Size
97KB
-
MD5
0cbc37f4e91557c54dc93428720301c7
-
SHA1
36c0d01c138e204a475098f4fe43f850a03bbd3c
-
SHA256
56f484bfbffeb7329f142b9086fc61e200cd9d6001e59c5a9c23fb45419318d6
-
SHA512
65397c8cc9735ea31351b64a114c63a2ee5dff127ee44fa60eef0a896783bd6db1ec665c1c1b3d7f4df65f3d0222f03208d5cb8bcf356b49e89d62b0cfbf4af9
-
SSDEEP
3072:iB80frWFRRy8hM1S7CLrBsYEzKNvolkkgl:GzW7U6MoeLrBsYA2X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\jad_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2776 2400 cmd.exe 15 PID 2400 wrote to memory of 2776 2400 cmd.exe 15 PID 2400 wrote to memory of 2776 2400 cmd.exe 15 PID 2776 wrote to memory of 2804 2776 rundll32.exe 30 PID 2776 wrote to memory of 2804 2776 rundll32.exe 30 PID 2776 wrote to memory of 2804 2776 rundll32.exe 30 PID 2776 wrote to memory of 2804 2776 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0cbc37f4e91557c54dc93428720301c7.jad1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0cbc37f4e91557c54dc93428720301c7.jad"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\0cbc37f4e91557c54dc93428720301c7.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e77a6c81d50d1890672ab6584162494e
SHA1a99e9dd2878beebe94e230d68c5a63e449ae85fc
SHA256794f6ed6c4d581ae0a744c3336ed7cf518e89bed3656441903f223743a060750
SHA51281b8e5ce05968fcb337913363b7871d060a2b8cec5118a8d819c9063f2bc162f4fa6f3664472b3364578634b7f3a30667a89f8531ef7eb1411bf90fd8d9d547c