Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
amtEDCTjQadgLql191.bin
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
amtEDCTjQadgLql191.bin
Resource
win10v2004-20240426-en
General
-
Target
amtEDCTjQadgLql191.bin
-
Size
483KB
-
MD5
a69f1e78a8c774a8721c4430fb407c4c
-
SHA1
9b710d3f55d5ae292ca6c2af1847c661b89f96dd
-
SHA256
4ec6ec5fe08b0eee840e4dd01f82e08c56789aeb4f5ed7498401cd8c65d29bfb
-
SHA512
e2301609923d8fbb33d6da15af827a227faacdb6f23eb4547baee17c24f696e3eefda298471af90dfc95a3f3231d81fb174b9d378b163d9a3244d5294ff94228
-
SSDEEP
12288:weqvN3dnJtfEbnv8PSkEj9uz63RM4Lw2fXZo0HS3tJxEMf5KEpO2ePApfIc:wR9dnb0v8P7Ejg63Oyw2fXZS3rIPMgc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2852 1752 cmd.exe 29 PID 1752 wrote to memory of 2852 1752 cmd.exe 29 PID 1752 wrote to memory of 2852 1752 cmd.exe 29 PID 2852 wrote to memory of 2712 2852 rundll32.exe 30 PID 2852 wrote to memory of 2712 2852 rundll32.exe 30 PID 2852 wrote to memory of 2712 2852 rundll32.exe 30 PID 2852 wrote to memory of 2712 2852 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\amtEDCTjQadgLql191.bin1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\amtEDCTjQadgLql191.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\amtEDCTjQadgLql191.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD506a6fc80fd750a3359fcaa12f99391bf
SHA1b9fb502a2e291fe5b421e3a0823f67fcdf23a567
SHA256106a319c63c761901c4f0aa88dedcc161a7bb586bcb10f6dc64c3fe1c1291d1b
SHA5128528af7f605f29808b8dfdb5fa296e96589ff88251026079c71679eaa9bc17e5253c764ce6c7ed70a98b3cb126384e3040e2c7de22682fe561dfa5da2c046288