Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/03/2024, 21:05

240325-zxdnnahe48 3

25/03/2024, 20:59

240325-zswcxahd77 3

25/03/2024, 20:56

240325-zq3dfahd45 3

25/03/2024, 20:51

240325-zm6xfshc96 3

25/03/2024, 20:45

240325-zj6ghsca7s 3

25/03/2024, 20:38

240325-zezs6shb67 3

25/03/2024, 20:36

240325-zdscpshb45 3

Analysis

  • max time kernel
    18s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 20:56

General

  • Target

    Prefetch/WINDOWSTERMINAL.EXE-29087F26.pf

  • Size

    31KB

  • MD5

    8b34557795bf36de05146b3bfda4fd6d

  • SHA1

    dbf989f5bcce9390e701aeb8d414aa3451d55e87

  • SHA256

    060c65fce6156893e49b3765e394f95f712230b87da2add6d0b400425eaa2f6b

  • SHA512

    c0643cd1e75351154eaeaa4c59dd1771b6f3626bf9195f2b260dc7207007b2b153aee42cf42d592359ede5b8ef9279555263ab39bd3de76f8b3e77ce7b2c7539

  • SSDEEP

    768:pwDIVma1R1h55iW1WHlTFkNaXNEijfkq5k:JVrR1/A2WxFkUNEAly

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\WINDOWSTERMINAL.EXE-29087F26.pf
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Prefetch\WINDOWSTERMINAL.EXE-29087F26.pf
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Prefetch\WINDOWSTERMINAL.EXE-29087F26.pf"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3b959dd9183cac4ea323038f997778ed

    SHA1

    3f09239636e0debc6f26c68b499959674270c2e1

    SHA256

    a7bf1bb51712b7dd3088189ba52737d80aa4cd86faba31f25cba18022fc08557

    SHA512

    2dd3dfe9e33aba2f3479085a3aae41d1d5b6f0dd84e3d16af5b8c28149dbc790b8869f2b17eebfca1f93a6038b4ef4be0497f3e54e2132d6058864d0e3356b00