Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
FE06A030.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FE06A030.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
FE06A030.pnach
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
FE06A030.pnach
Resource
win10v2004-20240226-en
General
-
Target
FE06A030.pnach
-
Size
717B
-
MD5
dc029fa134626515956d65028b17a13d
-
SHA1
025293456c942cec28b3b1abd8979826a786ef75
-
SHA256
56adaa424c266a229b154d9d21661b4af00d065adab89b83e2aa4fd09c52ec89
-
SHA512
c41ffd2cc335cdc643e98dc72d46afce4a8b4c998328fb5f1dcb5699f80119a889140e47fd5e45411a12b42b8ca97827d0e4cd1bde71e63ad244f9f94d18fac1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\pnach_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.pnach rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.pnach\ = "pnach_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\pnach_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\pnach_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\pnach_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\pnach_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\pnach_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2136 AcroRd32.exe 2136 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2568 2012 cmd.exe 29 PID 2012 wrote to memory of 2568 2012 cmd.exe 29 PID 2012 wrote to memory of 2568 2012 cmd.exe 29 PID 2568 wrote to memory of 2136 2568 rundll32.exe 30 PID 2568 wrote to memory of 2136 2568 rundll32.exe 30 PID 2568 wrote to memory of 2136 2568 rundll32.exe 30 PID 2568 wrote to memory of 2136 2568 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FE06A030.pnach1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\FE06A030.pnach2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\FE06A030.pnach"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50ab6678bcad7ce29ad3eb5f552d49636
SHA169895a9da60d1654ac602e0568ccc267ff0441fa
SHA256012eb9d03205a15cda34dad182f61dca48afb7c0c469ee5384b5886a26cf1086
SHA512d9b5723ad2f33f71feabaeeb0a28331398993d49a2a3fc41b59faad578d8b922a1caf0dd5a42cfb3740f2714899376b712608d29200e7272ac3598355d56948d