Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 07:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
[0.3.2] ChatSentinel Premium.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ChatSentinel/blacklist.yml
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
Information.txt
Resource
win7-20240221-en
General
-
Target
ChatSentinel/blacklist.yml
-
Size
7KB
-
MD5
0a8d0a3052ae7ac9f36a7472fd848d74
-
SHA1
746677f4c0e5edb88ec4d3f65f7dcb56d0593a08
-
SHA256
29588bb74610c517dff9659b8e132c52ee487c3f6a9a7b2a1a07cc91a3931916
-
SHA512
393d245b0b2544f347fdea6265a661c8e483f88cf6d6db642384c4a2c3e0aaa38403faa62d0d80a5688e25cb7da3ecbedb7d5d9734665b13c1d6d6acc5384449
-
SSDEEP
96:ajMpwK8wj5d5to2qcOdyHmhR6HXIFbzAjn/jP9IKlT6:ajMpwK8wBt8JR64xAFVlT6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\yml_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\yml_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\yml_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.yml rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.yml\ = "yml_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\yml_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\yml_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\yml_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 AcroRd32.exe 2552 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2948 3016 cmd.exe 29 PID 3016 wrote to memory of 2948 3016 cmd.exe 29 PID 3016 wrote to memory of 2948 3016 cmd.exe 29 PID 2948 wrote to memory of 2552 2948 rundll32.exe 30 PID 2948 wrote to memory of 2552 2948 rundll32.exe 30 PID 2948 wrote to memory of 2552 2948 rundll32.exe 30 PID 2948 wrote to memory of 2552 2948 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ChatSentinel\blacklist.yml1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ChatSentinel\blacklist.yml2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ChatSentinel\blacklist.yml"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c0053b78c94abbf3b4974a8098152115
SHA14acff28a86b7b27305de9c96626955b493cd9985
SHA25651044225ce5778aafc9bf39d8e77a1613289dc2eb40f7527f188fca85bed5067
SHA5121eb1a80a407479c05cebe78b1558166d208c61f9e00cb7c6760ef8d92662ef0081f8062287432cd17dbed6c2efd728d7761e9e6f8d762bed90f0b31c44d54dbe