Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/10/2024, 12:46

241012-pzt4ba1dmf 3

12/10/2024, 12:45

241012-pzd24avhqp 3

12/10/2024, 12:44

241012-pyyeca1dja 1

12/10/2024, 12:42

241012-pxr6ya1cme 1

05/08/2024, 23:13

240805-27gt6s1hln 6

08/07/2024, 16:42

240708-t71chsybln 3

07/07/2024, 23:47

240707-3svcdssckm 10

Analysis

  • max time kernel
    1559s
  • max time network
    1560s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 16:42

General

  • Target

    REGFuck-master/RegFuck/Form3.cs

  • Size

    326B

  • MD5

    5816207e0f01556ade62c2ec4ed4d956

  • SHA1

    6df7c64a881465269ff205a3222958b6bd4ea86f

  • SHA256

    e95c171f2f82656c24d66d6643d05bde086c21ee05959e88af9ba541c05285e3

  • SHA512

    f27ee8b49b9573bede7f550d19a7398e7e6d4e12790d1fa0231aed51d87bddb27f40a227fe2e559088082fa881456503d459876142bcfb8402b4bbb8e7e344cc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Form3.cs
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Form3.cs"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c86aaf7c903693a863365ba517e30338

    SHA1

    f9384e75164195ff8bd62796b049cb748616be64

    SHA256

    0a2f53ff524c799f135d95883b001c7eea90fd8489c58aedb451444d1a1445e5

    SHA512

    f355afe8d6d87287d848d2c4b85271cd9c0778ec2db20c3561c650104c039b7c7fbe39427728ebc6bad0d51c0f2967560e0a2c35db1d709c2cc1f570d085dc44