Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 04:54

General

  • Target

    Access.rar

  • Size

    2.1MB

  • MD5

    97320bc56008226d80a91f7aace52386

  • SHA1

    713e7d684ba125e11e008a6e9ee9118108219b43

  • SHA256

    c78fa5b39f8f805ebdaf9ad0f58ecc274f2caa3f6c60273813b27141182d7531

  • SHA512

    d4bc473f0a175ee76dd388e6298254305feeede90897351be71da06425c315e44f3f0368bb072b1b49df744597f4c72a7a08f2bd5b191299f416957488850faf

  • SSDEEP

    49152:ju/OYM5Vtkrnyx2BDvaKE+rm3/8zHs0QgW3MvUl9pVZ/J6g1Kj4KiDBPZm0/:aW/pod+V3AHs0ehm1s7V/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Access.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Access.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Access.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Access.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-30-0x000007FEF6FD0000-0x000007FEF7004000-memory.dmp

    Filesize

    208KB

  • memory/2404-29-0x000000013FB10000-0x000000013FC08000-memory.dmp

    Filesize

    992KB

  • memory/2404-32-0x000007FEF6F90000-0x000007FEF6FA8000-memory.dmp

    Filesize

    96KB

  • memory/2404-34-0x000007FEF69E0000-0x000007FEF69F1000-memory.dmp

    Filesize

    68KB

  • memory/2404-33-0x000007FEF6A00000-0x000007FEF6A17000-memory.dmp

    Filesize

    92KB

  • memory/2404-35-0x000007FEF69C0000-0x000007FEF69D7000-memory.dmp

    Filesize

    92KB

  • memory/2404-36-0x000007FEF64D0000-0x000007FEF64E1000-memory.dmp

    Filesize

    68KB

  • memory/2404-37-0x000007FEF64B0000-0x000007FEF64CD000-memory.dmp

    Filesize

    116KB

  • memory/2404-38-0x000007FEF6490000-0x000007FEF64A1000-memory.dmp

    Filesize

    68KB

  • memory/2404-31-0x000007FEF5780000-0x000007FEF5A36000-memory.dmp

    Filesize

    2.7MB

  • memory/2404-48-0x000007FEF3F90000-0x000007FEF3FA1000-memory.dmp

    Filesize

    68KB

  • memory/2404-40-0x000007FEF3FF0000-0x000007FEF41FB000-memory.dmp

    Filesize

    2.0MB

  • memory/2404-42-0x000007FEF6410000-0x000007FEF6431000-memory.dmp

    Filesize

    132KB

  • memory/2404-43-0x000007FEF5F80000-0x000007FEF5F98000-memory.dmp

    Filesize

    96KB

  • memory/2404-45-0x000007FEF5F40000-0x000007FEF5F51000-memory.dmp

    Filesize

    68KB

  • memory/2404-46-0x000007FEF3FD0000-0x000007FEF3FE1000-memory.dmp

    Filesize

    68KB

  • memory/2404-47-0x000007FEF3FB0000-0x000007FEF3FCB000-memory.dmp

    Filesize

    108KB

  • memory/2404-60-0x000007FEF3CE0000-0x000007FEF3CF2000-memory.dmp

    Filesize

    72KB

  • memory/2404-53-0x000007FEF3E30000-0x000007FEF3E41000-memory.dmp

    Filesize

    68KB

  • memory/2404-56-0x000007FEF3D70000-0x000007FEF3D94000-memory.dmp

    Filesize

    144KB

  • memory/2404-39-0x000007FEF4200000-0x000007FEF52B0000-memory.dmp

    Filesize

    16.7MB

  • memory/2404-57-0x000007FEF3D50000-0x000007FEF3D68000-memory.dmp

    Filesize

    96KB

  • memory/2404-55-0x000007FEF3DA0000-0x000007FEF3DC8000-memory.dmp

    Filesize

    160KB

  • memory/2404-54-0x000007FEF3DD0000-0x000007FEF3E27000-memory.dmp

    Filesize

    348KB

  • memory/2404-52-0x000007FEF3E50000-0x000007FEF3ECC000-memory.dmp

    Filesize

    496KB

  • memory/2404-51-0x000007FEF3ED0000-0x000007FEF3F37000-memory.dmp

    Filesize

    412KB

  • memory/2404-50-0x000007FEF3F40000-0x000007FEF3F70000-memory.dmp

    Filesize

    192KB

  • memory/2404-59-0x000007FEF3D00000-0x000007FEF3D11000-memory.dmp

    Filesize

    68KB

  • memory/2404-49-0x000007FEF3F70000-0x000007FEF3F88000-memory.dmp

    Filesize

    96KB

  • memory/2404-58-0x000007FEF3D20000-0x000007FEF3D43000-memory.dmp

    Filesize

    140KB

  • memory/2404-44-0x000007FEF5F60000-0x000007FEF5F71000-memory.dmp

    Filesize

    68KB

  • memory/2404-41-0x000007FEF6440000-0x000007FEF6481000-memory.dmp

    Filesize

    260KB