Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
Resource
win10v2004-20240611-en
General
-
Target
F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
-
Size
52.7MB
-
MD5
af70cfa317ec773e83fa2c0ed95546db
-
SHA1
cab301aaefdc841d14413723e3084920b2110c71
-
SHA256
9e9ad42a4bb31c4574b95aa57b534eeb25f068f8ed8f8691e4687e01cd13102f
-
SHA512
80b98d516f6d023e705e39db45322df1a0ae96a34b0cc9a9f6916d5e96778a85b3feec9bb826420f12ae54f7a793a19dcf0e3fa9557e7e90bd440df09c21ab0a
-
SSDEEP
786432:yxND1Cq62mWRDZA9gDECmtvWHlbaRmtQE1PIjhjppCiBrUWwz8dzsYFrH2uCShTY:Iwqz/RS9KEN1WHlIYwTJU2p92DiR6F
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\apk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\apk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\apk_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.apk rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2784 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2784 AcroRd32.exe 2784 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3020 2080 cmd.exe 29 PID 2080 wrote to memory of 3020 2080 cmd.exe 29 PID 2080 wrote to memory of 3020 2080 cmd.exe 29 PID 3020 wrote to memory of 2784 3020 rundll32.exe 30 PID 3020 wrote to memory of 2784 3020 rundll32.exe 30 PID 3020 wrote to memory of 2784 3020 rundll32.exe 30 PID 3020 wrote to memory of 2784 3020 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e1e5620be06a5271abe23652c8de2d5c
SHA1ccb6b278d8b9a97610f5125098e7105c884378ac
SHA2566ec95000a153217f43609dd11eaa09aa7cc1fdf1019349898b15d828ce25d3a2
SHA512d46c3b00eaf8d7809d00c0b387e47ea854d7c36d421e2e01acc52864d6787d3fcbafae14b8cb83d816dc02d31b8f462722e990a526a8f61f2a36e0baa2cd2a30