Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/03/2024, 21:05

240325-zxdnnahe48 3

25/03/2024, 20:59

240325-zswcxahd77 3

25/03/2024, 20:56

240325-zq3dfahd45 3

25/03/2024, 20:51

240325-zm6xfshc96 3

25/03/2024, 20:45

240325-zj6ghsca7s 3

25/03/2024, 20:38

240325-zezs6shb67 3

25/03/2024, 20:36

240325-zdscpshb45 3

Analysis

  • max time kernel
    18s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 20:56

General

  • Target

    Prefetch/WINDOWS.MEDIA.BACKGROUNDPLAYB-C5865726.pf

  • Size

    4KB

  • MD5

    a21c2ab265ab1ba1f04dd0ad3f32cb01

  • SHA1

    009a1e735b9a09907e0b2b3616913026b63a5068

  • SHA256

    6afb0b673804d4c136fafbd8cc32e4b7e020eb306f590a526f7b959d4d0dc00c

  • SHA512

    10388c99db9b7eae36efe0bc366832df3403238e378a81947277318bf96d58aa0ebfea631b4335b3fd60c9609fa3b160ef9881b847cd34bc07a15c2f4ab7c242

  • SSDEEP

    96:ksQ7FD9LCCaJphxkUNDg7heScdk2DnXc1VpqyVzFc:BQ7FJLPSiU5K8dk2DXszqT

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\WINDOWS.MEDIA.BACKGROUNDPLAYB-C5865726.pf
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Prefetch\WINDOWS.MEDIA.BACKGROUNDPLAYB-C5865726.pf
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Prefetch\WINDOWS.MEDIA.BACKGROUNDPLAYB-C5865726.pf"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a5b88f1435827a778750f543f6f76f63

    SHA1

    8c2cbf5192ab02e5f41f30b438c870766c963d46

    SHA256

    4cabec23e7f2d35f20136c1fc5f805dba77a4de060e8bc405e3aec77a3ffdda0

    SHA512

    4a2e445b54dfdfbe35b3341ad49436c7cd79c3b4e05d27a19c95b5b95c3c0b10bcebf6590eb315a27d3b76332606e90fee5d3f5db80599a6272d53b3b9f12deb