Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 15:58
Behavioral task
behavioral1
Sample
software.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
software.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
software.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
software.pyc
Resource
win10v2004-20240412-en
General
-
Target
software.pyc
-
Size
6KB
-
MD5
95802cc61c3ef4db4f0b44d736755eab
-
SHA1
cd9e70cd3153ff6e2790c08359c3f2aef8e3f53b
-
SHA256
8ca44bcf3808649f5e1ac752aa6a0c2381014b8275a1f884ed2670c09ac80231
-
SHA512
6c4f687acc004d513d1dab871e39d4eb2fb93a991c8c3d982c2f31f12f4faf0eb482ad6361ae0a4c797cc14af8aa23ca124af0a78346e89f116b8e1d98cf3a85
-
SSDEEP
96:SpDRFwFDGGnsEgCZ0PbXjfguWGZk1+351bzfHuyMZXLfRDCm7lAgw4lotD6uN:8PwdkElqx61+J1bGFCmlsD6y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2576 AcroRd32.exe 2576 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2540 1400 cmd.exe 29 PID 1400 wrote to memory of 2540 1400 cmd.exe 29 PID 1400 wrote to memory of 2540 1400 cmd.exe 29 PID 2540 wrote to memory of 2576 2540 rundll32.exe 30 PID 2540 wrote to memory of 2576 2540 rundll32.exe 30 PID 2540 wrote to memory of 2576 2540 rundll32.exe 30 PID 2540 wrote to memory of 2576 2540 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\software.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\software.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\software.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58a8cf377a2af7940d07faa784ee906c2
SHA1ceaef8c4c4c98ccef4bc746b57efd654c67a604e
SHA25677a39aa5d3d9d7e811134738988a107db39a72a2200b2fab156d506d2069ec4c
SHA512e735f4bb0596f9bd58e64cca6e749cc74bebb01ce5bc43044e93320da6ee1ed7921069fbb2a16850624ee6ce194a043269cd87e20647ff158e551091590877e5