Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
Копия трудовой.docx.rar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Копия трудовой.docx.rar
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Копия трудовой.docx.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Копия трудовой.docx.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$TEMP/Copy_trydovoj.docx
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$TEMP/Copy_trydovoj.docx
Resource
win10v2004-20240611-en
General
-
Target
Копия трудовой.docx.rar
-
Size
1.6MB
-
MD5
b59daecdced977f6cbb3cb45439872de
-
SHA1
7ba7bcc5df967864295766e4a21a01994143a08a
-
SHA256
fb28ec498a67d1cf4ebcbb358d1cad0ab86eada614198bdd5dfe3c61e464c1e7
-
SHA512
9b1f9d18866af6a26dd5fb14a7e3aa5f620a51340e7444ddaeb4e570f1e5fae3a1abf18978b0f0190bdb3105c979e4d3e2663e8b2a3af050dc344b5a9b521a29
-
SSDEEP
49152:FSA0WK/rpRbvUd3mF3i8+OjrHNap6T00j6l9qsshN6:FSA0x/rpRwwF3i8+wrHNTE3qRN6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2660 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe 2660 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2660 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2140 2820 cmd.exe 29 PID 2820 wrote to memory of 2140 2820 cmd.exe 29 PID 2820 wrote to memory of 2140 2820 cmd.exe 29 PID 2140 wrote to memory of 2660 2140 rundll32.exe 30 PID 2140 wrote to memory of 2660 2140 rundll32.exe 30 PID 2140 wrote to memory of 2660 2140 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Копия трудовой.docx.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Копия трудовой.docx.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Копия трудовой.docx.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2660
-
-