Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/05/2024, 17:55

240516-whltyagg49 8

16/05/2024, 17:41

240516-v9rc3aga5w 8

16/05/2024, 17:28

240516-v2byeafg62 8

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 17:28

General

  • Target

    Onerosity240.ops

  • Size

    50KB

  • MD5

    6b4519b036b5b1961ff12ebb9bf92152

  • SHA1

    d576508e86ec7e3c53bfbe8a68ee99b4e71fcc96

  • SHA256

    45b0d4e32da65cc44236f47f60d3d86704890afc7eb8ef3770107525c428b976

  • SHA512

    bb459f7cbe9d0498c4aaf8c8af0165c85bdecd99e218a37bf33e97fc30ba877d4d80db000cf34c8fce5e9ba29ff97b5a948adaae077f73cb5ed38b88ecb7440a

  • SSDEEP

    768:X3rc5jEdhpUqZW9zTgsodGHghAJVcRI8Gogh3U5e0WJ05XdQUHFtbAGYZ9:HiYdmQIHgcVf8G9h3X0K0X2UltUd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Onerosity240.ops
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Onerosity240.ops
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Onerosity240.ops"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2ee66b94513fbd51ef0da625f1bdbee0

    SHA1

    2df247e4ed607cd04fd08c248104bdc978c5d4ba

    SHA256

    33023c642eb6c1e8492e319f23f612f0468a0ed518ce38b336e51c2bd2f44593

    SHA512

    cf7d196a6a32940adaf62778d470aca06f139573de1a168a072628fc6296d1ed8660b434f246841e8a7e2114ac3344e035082645d8efd2c298e94800ac58925a