Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 19:43

General

  • Target

    www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar

  • Size

    274KB

  • MD5

    fe4e3a8852a9d01a2d3716cb27d0512d

  • SHA1

    96147471435c8992cf96f6741d6b517a75e520d5

  • SHA256

    5febf594512f13b3374ab927bbb266375e612c6b86f02ccdcb46f52898518bb2

  • SHA512

    83f27bf494ac073f18480cb2d73fabc9fc33647f20f363bd686aeb0343f2ab1d8f8914c4cbb4c513c2b04f64c6ba762acd471d118d50c1ba8f692529e373b7cd

  • SSDEEP

    6144:BTwoUA6wMiETudmDkWGNv7qPrZUzolpAg2bRL:BTL9MiEiHWMOraz1RL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\www.subs.ro_justice-league-unlimited-sezonul-3-2001.rar"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7zO07A37866\Justice League - 03x01 [BluRay][x264][1080p].srt
        3⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7zO07A37866\Justice League - 03x01 [BluRay][x264][1080p].srt"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zO07A37866\Justice League - 03x01 [BluRay][x264][1080p].srt

    Filesize

    12KB

    MD5

    7d6d5e1ffea3d96edc1bc3bd05f6eab0

    SHA1

    374f08f4dfa41c15727a6047d74e8d7571bc34a3

    SHA256

    1388f40b3d6357d7e099a85a0ac4294ad5ef20ccfa6044b394e80785a16db2db

    SHA512

    46c2a71cb08b09e8d0f6771b854cdfc429b50bfe767837e4658c2434d80d3ed83225285da07983dded2ff6c990b86520085c290e6fd427a3520292f0750dfcbd

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    84ff4abe3500ed57e5d8173290a759ad

    SHA1

    9237ec7f0483bd816882ac445a2c4a4a0fbe7de6

    SHA256

    1e038513eaeef8d69d4f16d3700b900bae362bab9e85bb407f6b288a3395977b

    SHA512

    616e6f0b9121f1e78939d84c815afe9cf7a41b4c1b1486410699f4e0834ac593fc2a22d30a903fc96e167f61afe7ecfb4c45b107a1d0aea8fb37747e56b0e192