Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3AntivirusD...in.zip
windows7-x64
7AntivirusD...in.zip
windows10-2004-x64
1AntivirusD...ibutes
windows7-x64
3AntivirusD...ibutes
windows10-2004-x64
3AntivirusD....0.lnk
windows7-x64
3AntivirusD....0.lnk
windows10-2004-x64
7AntivirusD...ICENSE
windows7-x64
1AntivirusD...ICENSE
windows10-2004-x64
1AntivirusD...DME.md
windows7-x64
3AntivirusD...DME.md
windows10-2004-x64
3AntivirusD...ST.exe
windows7-x64
1AntivirusD...ST.exe
windows10-2004-x64
1AntivirusD...fw.dll
windows7-x64
1AntivirusD...fw.dll
windows10-2004-x64
1Resubmissions
08/07/2024, 11:05
240708-m639fsyaph 408/07/2024, 11:00
240708-m359msxhrf 308/07/2024, 10:54
240708-mzmm5avgrj 308/07/2024, 10:49
240708-mw431axfra 708/07/2024, 10:46
240708-mtxwxaxfjc 308/07/2024, 10:42
240708-mrn6zsxekb 7Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
AntivirusDefender8.0-main.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
AntivirusDefender8.0-main.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
AntivirusDefender8.0-main/.gitattributes
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
AntivirusDefender8.0-main/.gitattributes
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
AntivirusDefender8.0-main/AntivirusDefender8.0.lnk
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
AntivirusDefender8.0-main/AntivirusDefender8.0.lnk
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
AntivirusDefender8.0-main/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
AntivirusDefender8.0-main/LICENSE
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
AntivirusDefender8.0-main/README.md
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
AntivirusDefender8.0-main/README.md
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
AntivirusDefender8.0-main/RUNTHISFIRST.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
AntivirusDefender8.0-main/RUNTHISFIRST.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
AntivirusDefender8.0-main/bootmgfw.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
AntivirusDefender8.0-main/bootmgfw.dll
Resource
win10v2004-20240704-en
General
-
Target
AntivirusDefender8.0-main/README.md
-
Size
75B
-
MD5
1ef2449c0655d9c8f7335d5f4e18a1f0
-
SHA1
be20ac57040d58c08125f5268286af8cc031f30e
-
SHA256
64565cbcfba9ae621d79b758bc2b6bb737a000cdb8d36aaa716d6b24c6b4e1e9
-
SHA512
ad4b7fa705d3dbefee5a5ab004eeb172b2248290d6a6cd06443ebe9536cbb6d51d3eb6955edb81f04f8aa96f2c252a3626e555c860f9edaa85c1f72916096ad0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\md_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.md rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2584 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 AcroRd32.exe 2584 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2756 3056 cmd.exe 31 PID 3056 wrote to memory of 2756 3056 cmd.exe 31 PID 3056 wrote to memory of 2756 3056 cmd.exe 31 PID 2756 wrote to memory of 2584 2756 rundll32.exe 32 PID 2756 wrote to memory of 2584 2756 rundll32.exe 32 PID 2756 wrote to memory of 2584 2756 rundll32.exe 32 PID 2756 wrote to memory of 2584 2756 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5de7043025801ee595ff8a204ee12f32c
SHA14555018ce6aa08c65cbc609668429d6945821d51
SHA256ae329f7f661dc29e73d601a563197f6b26c746a5ab2fef17a936d79b80bd5b82
SHA512421b9523e1d1a8b4224a008ed9aba87937cdb53c5623f5ea70f841dfe23d8ea292c9e4cac32d3440d9ed5a72216ff53b532f0d2ce3bd638606a93de55cd13076