Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/10/2024, 12:46

241012-pzt4ba1dmf 3

12/10/2024, 12:45

241012-pzd24avhqp 3

12/10/2024, 12:44

241012-pyyeca1dja 1

12/10/2024, 12:42

241012-pxr6ya1cme 1

05/08/2024, 23:13

240805-27gt6s1hln 6

08/07/2024, 16:42

240708-t71chsybln 3

07/07/2024, 23:47

240707-3svcdssckm 10

Analysis

  • max time kernel
    1561s
  • max time network
    1563s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 16:42

General

  • Target

    REGFuck-master/RegFuck/Form4.cs

  • Size

    1KB

  • MD5

    2117b18f010564d499f11fec10d3856b

  • SHA1

    17a97d5ba3867f8fad77247f496ee12f472d87e4

  • SHA256

    4cafda39e42e978dfde588a7a6268c4ec67ad171081c582bb3f2c99717ec9095

  • SHA512

    291651e8fe2a4a8812e3d5161bf89e4a4722a3f98e673f7ad2d26333be675181dd81ae2b91530022f29b55211e22cb555936a87bd8bcba9d13258b167cbbf9b6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Form4.cs
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Form4.cs"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f9cb46a19e3b77d41bd617d2f07a9940

    SHA1

    b97c9fa962ef11ddd0ccb09e339dd14f931560bc

    SHA256

    9d4fdea53dd8bd0326f37533c27f0ac25be19df57e3a50482d33e0f6bef7a005

    SHA512

    054de44a394fa1a806c07911ed2fb550fff605957387a0e3f717bc0b61c3ce3e673aed845d8e716b1c71d9635fe53ee5e26dd987db86036b8d822895ef8fd6c2