Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
17665430faeaedcedd623d6408fc4fa2.jpg
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17665430faeaedcedd623d6408fc4fa2.jpg
Resource
win10v2004-20240419-en
General
-
Target
17665430faeaedcedd623d6408fc4fa2.jpg
-
Size
135KB
-
MD5
f801a77f93fb6c57b588a14921d24aac
-
SHA1
64aac7eeda468a013b721d39b278ac718b44bf8d
-
SHA256
6ee8ab63cbe7f067bacc0eeee74b1f4f2ebcfff24f17bb6c88d070dc5f7d2bc9
-
SHA512
8f8ea9a22d8d3d89b3ea690c24115ad4c4d12241b28bb345782aed2e8f0c81a4af467398e093def620d59656a32595c1ab4b4ffbcdd9da56b5c5e35ebb1076d0
-
SSDEEP
3072:jnTXAhy+3ImneayKsXoxDBaXQlQ7jYSAhDSnmGJMf:Ds4T4Xx9aAlAhODSmGS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2068 rundll32.exe Token: SeTakeOwnershipPrivilege 2068 rundll32.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2068 rundll32.exe 2068 rundll32.exe 2920 efsui.exe 2920 efsui.exe 2920 efsui.exe 2920 efsui.exe 2068 rundll32.exe 2068 rundll32.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2920 efsui.exe 2920 efsui.exe 2920 efsui.exe 2920 efsui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 rundll32.exe
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\17665430faeaedcedd623d6408fc4fa2.jpg1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2068
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2920