Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
start.sh
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
start.sh
Resource
win10v2004-20240426-en
General
-
Target
start.sh
-
Size
24B
-
MD5
2c1e115a952704656dac0865712e93f1
-
SHA1
04793ffc4a7ba101c646c8691884b65bd75b1f47
-
SHA256
74b8c6ca7e6938a8f17791223de22e972522c2375f7f11ace86def80c2ff39df
-
SHA512
f248fe1ec725b1bfaa4f519d241ba4ea34b15c7f671ed9adcee5d663cd23d5af8b0b7b5f2f50f1980b922e2ed2510b644717981d50d4faeb42b098955cce9dcd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2624 AcroRd32.exe 2624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2492 2004 cmd.exe 29 PID 2004 wrote to memory of 2492 2004 cmd.exe 29 PID 2004 wrote to memory of 2492 2004 cmd.exe 29 PID 2492 wrote to memory of 2624 2492 rundll32.exe 30 PID 2492 wrote to memory of 2624 2492 rundll32.exe 30 PID 2492 wrote to memory of 2624 2492 rundll32.exe 30 PID 2492 wrote to memory of 2624 2492 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\start.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\start.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\start.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c0e9bbdc0c617aebcd4865256bf2e081
SHA1eab26b8604d4888b3e5feffff232441c0c066b04
SHA25603e67e175003b6bbd5cc85fff913122ffea533fff24f300a41dba4d7c16141e1
SHA5124e763a649a209b361a5055c1f691be7599295249af4a932aee855cfddae4692da13554ce2f1bbcd48dca862ca2e99fcf8ec2f111abde39b811e4832a1ff0f607