Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/05/2024, 11:24

240513-nh59ksdb56 8

13/05/2024, 11:20

240513-nfswgaca8z 3

12/05/2024, 17:12

240512-vqxezaff8v 8

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 11:24

General

  • Target

    Nitro-Generator-Checker-main/CODE_OF_CONDUCT.md

  • Size

    5KB

  • MD5

    2da26bc0ae99da15e35452e1af5c99b4

  • SHA1

    815632e7700f3825feac2da74e46de6570c67d63

  • SHA256

    fcf3e211a39136eda6a520283bbcf8468cf17c0bf9b877ff96a3c4ff52ed020e

  • SHA512

    b4ef9abfd2c4f18b2fb3cac025ae59f06e86eef2b2d033ee846e25c3352065caca4585b1cd17d1b66a905ec7d4b93fd3ab949e2b0f2ebee839dce1a09b96057c

  • SSDEEP

    96:b1kS+vFNKWIdGPWFR0sIvBw15XVwqTs77rOKIjFwoqHoPFTORFq/FQLw5cVGqbfy:iS+vFNKW+kWbGmX7BNjFwToPFTUFq/Fv

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-Checker-main\CODE_OF_CONDUCT.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-Checker-main\CODE_OF_CONDUCT.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-Checker-main\CODE_OF_CONDUCT.md"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5b17bd9d39e18252748111cd7d6b772f

    SHA1

    c9b7e97b6d548820a78dc0c100d49e17c7ef3c26

    SHA256

    d9792fcae1cf3931cf398843bc62b242f8ffd0b1fadcc1cd4701b764ce1a5357

    SHA512

    99eef7408def7f899fc45d4979492ac9a2507d5b3fec2202e2aedf6c9512649ee401c967d94a4c85e0d1244001220f0bacd5b5b9f7d1c8bd7f5b3f428d8d6501