Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
index.php
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
index.php
Resource
win10v2004-20240508-en
General
-
Target
index.php
-
Size
1B
-
MD5
68b329da9893e34099c7d8ad5cb9c940
-
SHA1
adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
-
SHA256
01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
-
SHA512
be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\php_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\php_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.php\ = "php_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.php rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\php_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\php_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\php_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\php_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2628 AcroRd32.exe 2628 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2696 1916 cmd.exe 29 PID 1916 wrote to memory of 2696 1916 cmd.exe 29 PID 1916 wrote to memory of 2696 1916 cmd.exe 29 PID 2696 wrote to memory of 2628 2696 rundll32.exe 30 PID 2696 wrote to memory of 2628 2696 rundll32.exe 30 PID 2696 wrote to memory of 2628 2696 rundll32.exe 30 PID 2696 wrote to memory of 2628 2696 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\index.php1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\index.php2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\index.php"3⤵
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d77f7c3c4576d5244f6f56d978f3e93a
SHA18869baca1a409c035bb46a0b874ba8f149f0d6f6
SHA2565a001c18a937ca66010cdeccd6a239a7f4473fecc2a6dd2220c5a83f910a76ad
SHA51292f97778feaf57418570ef523409f715e7aff4f38a0e555e396f4a55713fa4c7a40b2f45040f6d65d1682c6d016896de7f380f16cc10d6f0bc053126bd4f6932