Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 13:36

General

  • Target

    Multi_Giftcard_Gen.rar

  • Size

    3.8MB

  • MD5

    92a1c10a5e9a6c1f06943f1b979c4d20

  • SHA1

    a5ce9d457e7a614ca1f3e17d60434a61fbe32098

  • SHA256

    d6193ac848e9413eb2a9158c9b50ddacaccc2877945b7f9d0bc5c387e1cc1d81

  • SHA512

    444af96f84a33776c3a67dbd0635a269f8639723e745a2cd45ca8c8fe3a0588180106c33e60c75b116d5ddaf6464d3e2dea0ae3f2b4cdbda54344e0fe773e870

  • SSDEEP

    98304:cAYXzcJR91qlLDDRTUWBX2xUlNflDRQAA9XgtJaJxFJtL:cAozyqlnDRT421tpZLaJxFJV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 12 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Multi_Giftcard_Gen.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Multi_Giftcard_Gen.rar"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7zOCDA69EC6\README.md
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zOCDA69EC6\README.md
          4⤵
          • Opens file in notepad (likely ransom note)
          PID:2844
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zOCDA46217\amazon.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zOCDA46217\amazon.txt

    Filesize

    1.8MB

    MD5

    320012a4f7a0fee4bf0f79ae4f3d583d

    SHA1

    fe9156b9716e898ea4059315831052355137874b

    SHA256

    c6718f81ceddfe6ec8a6bdeb299f644a8cf784a4aad3a3cec3077f0fccc0cd00

    SHA512

    86c89f743f3a62cd80c87fe622cc8c1879b2621fa500a1fb7791fe377678b190ead247caa34ab60aa4114b0bd4d43c1f169ef66dc8c5819631fc4a8b2318d952

  • C:\Users\Admin\AppData\Local\Temp\7zOCDA69EC6\README.md

    Filesize

    819B

    MD5

    38c230403c2718404e7ec310b7ec3ba0

    SHA1

    f0ec09315f9d290005e0a778bdb2a1b061dea997

    SHA256

    0560fbdc579e282543ca1b69c66568e4b73dade606caa86c0fd77a3d5a89fdc1

    SHA512

    6f05590d479fa5f363fd69b5acb26a4b163db3b4b6efda6791b48076aff08df0e0804b652e9d51b1b6958e7fd1f2f2822508ce392e26f9b2a43a720276775e51