Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 11:20

General

  • Target

    a1bce520ca9d835b7757058505493c49.exe

  • Size

    252KB

  • MD5

    a1bce520ca9d835b7757058505493c49

  • SHA1

    ac563570847617f7f68d1142c2b30c4455261c12

  • SHA256

    417947f3a7839131efb296281c30bd57ce2533bf97ae35dfdaeeb49f7d8b1e8d

  • SHA512

    fe9fc691a7dce53067556c173d9d599d86e882f90661e55e25aca08b92da64bdca51c84da4af9e4ba4bea66e2733e19eba9a89ba744626684fe91419a9b41494

  • SSDEEP

    6144:VlzknoBcRzrWsJywvP6bQ7yMP+DE827OaFSEpAX:nAnZRzJT6b7MP+Dd2iafpAX

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1bce520ca9d835b7757058505493c49.exe
    "C:\Users\Admin\AppData\Local\Temp\a1bce520ca9d835b7757058505493c49.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe "c:\FINAL_TBF2.pdf"
      2⤵
        PID:1972
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\FINAL_TBF2.pdf"
        2⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      0e200274f22535082b337024ce3dd8b5

      SHA1

      3a8447647896aa7e7eeed14877ab622be870824f

      SHA256

      35ae12451139c26ff066b424a8d5b27a448fcd67bb4a56abad019db74001a125

      SHA512

      4f941adba3ddb9365099ebf5a61f0f65031bd5f2a8e39f00b735caad9f862c204552596708563fea85e3b2124b7f45e5625d9238a474805504b327543b7989b7

    • memory/2992-0-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/2992-6-0x0000000000280000-0x00000000002B0000-memory.dmp

      Filesize

      192KB

    • memory/2992-5-0x0000000000270000-0x0000000000277000-memory.dmp

      Filesize

      28KB

    • memory/2992-4-0x00000000002B0000-0x00000000002B2000-memory.dmp

      Filesize

      8KB

    • memory/2992-3-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/2992-1-0x0000000000230000-0x00000000002AA000-memory.dmp

      Filesize

      488KB

    • memory/2992-7-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB