Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
844s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
Desktop.7z
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Desktop.7z
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
URL.txt
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
URL.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
검색.txt
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
검색.txt
Resource
win10v2004-20240426-en
General
-
Target
Desktop.7z
-
Size
913B
-
MD5
cfd65b3690a355ad00575a3c95b54d0b
-
SHA1
1a94e0f98fc36df1862a95901a1ce52f59ae0593
-
SHA256
9e97c9f14330e4da3835bceccb919b6281f6ed4bc26ee66e1e08451f55e71304
-
SHA512
1662b333cddb104e509276994df13919517af34b85a168257e8f8fb141d0d6229f16594962fb83ac06e5c84e6aa5f6000f45947e83f6cd1535666466adba7baf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\7z_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\7z_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\7z_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\7z_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\7z_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.7z rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.7z\ = "7z_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\7z_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2848 2044 cmd.exe 29 PID 2044 wrote to memory of 2848 2044 cmd.exe 29 PID 2044 wrote to memory of 2848 2044 cmd.exe 29 PID 2848 wrote to memory of 2712 2848 rundll32.exe 30 PID 2848 wrote to memory of 2712 2848 rundll32.exe 30 PID 2848 wrote to memory of 2712 2848 rundll32.exe 30 PID 2848 wrote to memory of 2712 2848 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Desktop.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Desktop.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Desktop.7z"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fdf1bab50ca23d82e1309c47d85c0344
SHA19fbc208d3333e32661a36c5e823ba229bb60960e
SHA25618e41b41f0de66eac2a06b98297517809642c73f06f43b893b10f7e8f7eb95e6
SHA5126edbcabe3f59600aebad723efa170fa6e5a6a409414439591b6bd2989f8ec5aea9bb1a54ee99421c12d098d97081bb3c2bd4ce3ade5cb068f9f325697c5a7d47