Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
rha.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
rha.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
data.bin
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
data.bin
Resource
win10v2004-20240319-en
Behavioral task
behavioral5
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
file.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
g2m.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
g2m.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
run.bat
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
run.bat
Resource
win10v2004-20240226-en
General
-
Target
data.bin
-
Size
385KB
-
MD5
364a46c611cd7fead3527533982c616e
-
SHA1
3b0c8cce7a3a462d8865487f28d68c38de6851c4
-
SHA256
6963569bfd71c7b642826ac0cd8ac2511510168204b68a7b9940d656059f7df8
-
SHA512
9bc71ccc5e330b2641ef57c570e49ca944d4d4de633698adf1813e1a1368c4b700d71e63598c8caa55272e4cb310aeac1eb827980a69ee03f7f7d528dddc9f7d
-
SSDEEP
12288:6uFh7GCuzMgjOxEJ+ThSddxs2E45TpbfNNKGIh:17xxgCcdq2EQTpbfNNtq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\bin_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2904 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 AcroRd32.exe 2904 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2288 2944 cmd.exe 29 PID 2944 wrote to memory of 2288 2944 cmd.exe 29 PID 2944 wrote to memory of 2288 2944 cmd.exe 29 PID 2288 wrote to memory of 2904 2288 rundll32.exe 30 PID 2288 wrote to memory of 2904 2288 rundll32.exe 30 PID 2288 wrote to memory of 2904 2288 rundll32.exe 30 PID 2288 wrote to memory of 2904 2288 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\data.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\data.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5036b4892ae6ecb7d97e1c9b8400291ac
SHA1a307aff9142aa2208252c0569e42e15c2ed14ba8
SHA256983a7bd10fcfc36b66ea1bbc4eeffe54976f7e10f2c843b48c4643483fd9c384
SHA51299b3cff0a271538008152167400c668535231e3a97e9a968f51db482e3f1167de16ed2acfe0a62135f3fa207d6e13800060af9692c8f93b12b01c66a4e04db23