Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 08:45

General

  • Target

    qqyt33.sh

  • Size

    1KB

  • MD5

    51d259c0b3377bfb529748c0ccd17c1f

  • SHA1

    46e464f4e8af24bb52a7f48417b4d3f6f0fec27f

  • SHA256

    afb2b8145bec0b4a38f3af97d174c14e2609668379a0c26db4e2fe0cb4afa289

  • SHA512

    d0004aa11448244b059738a96631ef2b349987f1a810a445e4fbb8fdf8927794d59a88fe79c0ca95a7b17a315c9871f54c64ca0e48e8446b904688077a2d02ef

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\qqyt33.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\qqyt33.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\qqyt33.sh"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8dc63dba799c4bb5b8a7aae81a08093f

    SHA1

    3a71867e5bb85df3903b5e2d8cd8f0f88e21d738

    SHA256

    e0c1a606d302c5f8c0b5f93145b987719d09879ca94a2dc54831e52ad6499526

    SHA512

    980ec3ccbec1f4d32c4fe55cd21fa325d35c4d5ed8e59be90c9e47fad290c9769f0ecbf9ae64448b312f7a39dee776af684fc093766ab33c7b9d5fc419c15b87