Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
Access.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Access.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Access/Read.txt
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Access/Read.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Access/Redirect to Access.exe
Resource
win7-20240221-en
General
-
Target
Access.rar
-
Size
2.1MB
-
MD5
97320bc56008226d80a91f7aace52386
-
SHA1
713e7d684ba125e11e008a6e9ee9118108219b43
-
SHA256
c78fa5b39f8f805ebdaf9ad0f58ecc274f2caa3f6c60273813b27141182d7531
-
SHA512
d4bc473f0a175ee76dd388e6298254305feeede90897351be71da06425c315e44f3f0368bb072b1b49df744597f4c72a7a08f2bd5b191299f416957488850faf
-
SSDEEP
49152:ju/OYM5Vtkrnyx2BDvaKE+rm3/8zHs0QgW3MvUl9pVZ/J6g1Kj4KiDBPZm0/:aW/pod+V3AHs0ehm1s7V/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2404 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe 2404 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2340 1368 cmd.exe 29 PID 1368 wrote to memory of 2340 1368 cmd.exe 29 PID 1368 wrote to memory of 2340 1368 cmd.exe 29 PID 2340 wrote to memory of 2668 2340 rundll32.exe 30 PID 2340 wrote to memory of 2668 2340 rundll32.exe 30 PID 2340 wrote to memory of 2668 2340 rundll32.exe 30 PID 2668 wrote to memory of 2404 2668 rundll32.exe 32 PID 2668 wrote to memory of 2404 2668 rundll32.exe 32 PID 2668 wrote to memory of 2404 2668 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Access.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Access.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Access.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Access.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
-