Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 17:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Keys 17.0.0.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Keys 17.0.0.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Keys 17.0.0/prod.keys
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Keys 17.0.0/prod.keys
Resource
win10v2004-20240226-en
General
-
Target
Keys 17.0.0/prod.keys
-
Size
14KB
-
MD5
4ed853d4a52e6b9b9e11954f155ecb8a
-
SHA1
d6cedce971a2a4ab2588e39285a9d2fb37b62924
-
SHA256
76df55f85c6628cd924f227a72a301bbb731833c0a0f00c440e01e6b34480990
-
SHA512
270807500ee0e4a2414efe7d05d59fb2fd17830a2433342a06502355ddc8694b667760a8d2cd50a150d529c21dcdc243bce026251f00ccbcfde403d44064c59b
-
SSDEEP
384:inP5ycEm3I3Re4qwjHJMN3lhDkzRdKOKKY:inPvt3ImCHJMNVhDkzaOKZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\keys_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\keys_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\keys_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\keys_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.keys\ = "keys_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\keys_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.keys rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\keys_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2832 AcroRd32.exe 2832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2544 3024 cmd.exe 29 PID 3024 wrote to memory of 2544 3024 cmd.exe 29 PID 3024 wrote to memory of 2544 3024 cmd.exe 29 PID 2544 wrote to memory of 2832 2544 rundll32.exe 30 PID 2544 wrote to memory of 2832 2544 rundll32.exe 30 PID 2544 wrote to memory of 2832 2544 rundll32.exe 30 PID 2544 wrote to memory of 2832 2544 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Keys 17.0.0\prod.keys"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Keys 17.0.0\prod.keys2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Keys 17.0.0\prod.keys"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD583063890b8bbcd45311a109b6f915595
SHA1464167dd7aeea39b287cd22f554f47717d55b10d
SHA2569c53521fb87fc2efb3fbd34dbb352aadab7a39b515c409b38a8fbec1c0d74a6b
SHA512105f445d2103d4e9e1ebbd2761075865fc667a1c4534b42d9a00f453aaf3be9ce3f79519cf8a6beb43d5cbe4b72c659c5b679e510c5db313337115380165ac6e