Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
Setup.7z
Resource
win7-20240708-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Setup.7z
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
Setup.7z
-
Size
12.5MB
-
MD5
d4ffa435f2f10c1bc46732527ad8ce59
-
SHA1
83aed3c63577ff9869c507e08dce08e204d887d8
-
SHA256
e3eaeb7ae99fd03c0027878f5d883e033608933471e8e06f1a970ffcdd4f6341
-
SHA512
3c63ce893d1305b46444282ae9ae29c40113a891dac9bd88a98fbaa772ceb46655c759e9dee21b3d76eefb74f0bb77287e5d43f30ed661d08771c10252e41334
-
SSDEEP
393216:Ac4fIdcIuhi1fh0pfHKX61+JIb2BglOE1m4un52eN+fF:oQd0NvKq25nNyF
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2720 2252 cmd.exe 31 PID 2252 wrote to memory of 2720 2252 cmd.exe 31 PID 2252 wrote to memory of 2720 2252 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Setup.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Setup.7z2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2720
-