Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 08:09

General

  • Target

    RJ01082861-PC/nw_100_percent.pak

  • Size

    808KB

  • MD5

    2b302df5126585962982c5f9173b0413

  • SHA1

    0729dfa5fee344e5530528f35d3e1348cbe44a53

  • SHA256

    295fc26bb067bb062897c7468d508c2007b1531b3b050251a3f73e408c6982b1

  • SHA512

    5003aa447412f44f0e38cbabef0824b16a8de33673cfe30dc9d31d82075b99767a668760c6757911a264e2f52b8730ef818218134b9cc340276ca9d052653734

  • SSDEEP

    6144:lK1KUa3mN+IK0rYvFJLKRQ8UnDwXw/51zxHcSgEal9Dxd0NvmxzaK1aaaDfTEvVR:8ra3ilUeUH/51LLEtuIjgRjict+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\RJ01082861-PC\nw_100_percent.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RJ01082861-PC\nw_100_percent.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RJ01082861-PC\nw_100_percent.pak"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7baa6d511ba7af47a6f32d6607ceea33

    SHA1

    6472b7ba867760acd6e24c69d5c748b8be7eac83

    SHA256

    a3e91d21ad3c8edf0712a9426c21a596aac4403a5aa1b25a6d94eeccad79f62b

    SHA512

    5da497dcbdf981d73a868cc833669a77b71b5d6037c205d5880cb54d9d99c46cb197a73b74c5c0d6f7064676ef002d3870df971c6af3e8085d1cf43b420c4d0d