Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 11:26

General

  • Target

    rrpy/DZSB/Add-on/DZSB/dlc.rpf

  • Size

    27.6MB

  • MD5

    71547aaa0a3e8efcbbda306accdd458a

  • SHA1

    4ad76e8f22a38e9d45fe57334bdde04a4c4170df

  • SHA256

    b7c1bc6315eeb814d77533285320aae610ab22cf2141c4e51dd5c7183545dd46

  • SHA512

    bf868a9762a568c99ad7ba697c50e1c46e646094d3ead2a3135b0e63fcd7822c1b948f13ef4bd2c1241f1cf09e6a832a9530feeafc91ac387216f3ba42c3e645

  • SSDEEP

    393216:04RFK0RZ6k35YrrJ8Wk1bYPfccJGCaWoNp3j+9mRz+:0UKeZ6ZvWXtUsCTo/3j+ii

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\rrpy\DZSB\Add-on\DZSB\dlc.rpf
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rrpy\DZSB\Add-on\DZSB\dlc.rpf
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rrpy\DZSB\Add-on\DZSB\dlc.rpf"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    364349a509483d334026984e9799c3f9

    SHA1

    4f7eb6b99eb7589d5bced2abbaadf75d9a4f33dd

    SHA256

    ae01116a697a3c472832533489b9bfd656e679f7e64c905aaca1a8cb3ae40831

    SHA512

    57f3150ac60d50d8445a762a440adc12d351aef843afcf46f29ba3a70f9f5305e1365a3bc36e42de4f93832a2a6fc0edf04eea8d777512b08fb7b1a76338889d