Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
a536dc562efda7c51558e7a3cbaca99eeb09a1edf67384f68e4c8c6b9a28b48f.unknown
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a536dc562efda7c51558e7a3cbaca99eeb09a1edf67384f68e4c8c6b9a28b48f.unknown
Resource
win10v2004-20231222-en
General
-
Target
a536dc562efda7c51558e7a3cbaca99eeb09a1edf67384f68e4c8c6b9a28b48f.unknown
-
Size
39KB
-
MD5
d9f65de3476b4097e61d0897a9f8b217
-
SHA1
1048075dbff90f545a5d2ac5609a9481aafca405
-
SHA256
a536dc562efda7c51558e7a3cbaca99eeb09a1edf67384f68e4c8c6b9a28b48f
-
SHA512
d27e509b1745ad4fc1c6c51757b5dd5ef88aebfc071dc0fb5152885dec834cfc550b7f072027c8b84810b401184e44e0e26fef1a05e810ba3b280c1e4b0531d1
-
SSDEEP
768:4pbdPh9fqQaNWTqu9j8eTKHyfbBvfy8MQGNiZIqecbIDPKj9mV:4FT9fqsTL+hSlX4NkIqeB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.unknown rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.unknown\ = "unknown_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\unknown_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\unknown_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\unknown_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\unknown_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\unknown_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\unknown_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2908 1732 cmd.exe 29 PID 1732 wrote to memory of 2908 1732 cmd.exe 29 PID 1732 wrote to memory of 2908 1732 cmd.exe 29 PID 2908 wrote to memory of 2804 2908 rundll32.exe 30 PID 2908 wrote to memory of 2804 2908 rundll32.exe 30 PID 2908 wrote to memory of 2804 2908 rundll32.exe 30 PID 2908 wrote to memory of 2804 2908 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a536dc562efda7c51558e7a3cbaca99eeb09a1edf67384f68e4c8c6b9a28b48f.unknown1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\a536dc562efda7c51558e7a3cbaca99eeb09a1edf67384f68e4c8c6b9a28b48f.unknown2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a536dc562efda7c51558e7a3cbaca99eeb09a1edf67384f68e4c8c6b9a28b48f.unknown"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b1700c295640160399d66c203806c514
SHA12d28b4f2add2fa3758d35f46be6a522e706c12b2
SHA25689d78d9cba1d9ed75112218d0504329ee908b8510f99bd597c2046ca975b4b97
SHA51242f740d33c31bb7ac163c338aa10daf4e8989d6de61b2899dac78926e210a6850a83d19709a35b0a001426118ecaf49e81539b1d0915fb3317582d38bb3bfed3