Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1565s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
Unconfirmed 361706.crdownload
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Unconfirmed 361706.crdownload
Resource
win10v2004-20240226-en
General
-
Target
Unconfirmed 361706.crdownload
-
Size
16KB
-
MD5
a683ce8842677a44a46c44d66a2686ae
-
SHA1
a3da18f801d03d659b4fa28a03e91a52b78868df
-
SHA256
fb2e430884d3a71604aeb2b8643d42a85215d9145bc7791bef3ef70c85b68ec8
-
SHA512
7bc639233698d9bf48329a8e64ea6b481dba3959c2e22c0f87b353d770bd73dfd82ce867bc0c23b07d038102d10afa173272ff2e2261726e10941d659eefad5a
-
SSDEEP
384:dq4F4xuFtb5+Nxt/ZtNNxuQOq/9rQdIu2/L1anjZ:7ixotWxllNFn/cIv/onN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\crdownload_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\crdownload_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.crdownload\ = "crdownload_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\crdownload_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\crdownload_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\crdownload_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\crdownload_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.crdownload rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2840 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2840 AcroRd32.exe 2840 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2636 2204 cmd.exe 29 PID 2204 wrote to memory of 2636 2204 cmd.exe 29 PID 2204 wrote to memory of 2636 2204 cmd.exe 29 PID 2636 wrote to memory of 2840 2636 rundll32.exe 30 PID 2636 wrote to memory of 2840 2636 rundll32.exe 30 PID 2636 wrote to memory of 2840 2636 rundll32.exe 30 PID 2636 wrote to memory of 2840 2636 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Unconfirmed 361706.crdownload"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Unconfirmed 361706.crdownload2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Unconfirmed 361706.crdownload"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53f6bc14a37fb2b81aa62aac5de1ad556
SHA11e5ed2924c294ba7068b1c5b122db0bc697bda4e
SHA25624fc686a3fd3d4500e9d1788a7968035f4f91fe87c51fc6381040a44b91591d1
SHA5129be57f028a6a85b216b3ce76f23558fad71f81f9000c4b515145560a7f2b8c342980ed91342db477f38c298d8926391c09059df62aee41655a027f76ca01e18f