Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 17:49

General

  • Target

    AK.class

  • Size

    214B

  • MD5

    2c8449b2be905f0257ea62096baa8b2a

  • SHA1

    77188304bbbd035d20b69ea4efeff70e6e299652

  • SHA256

    42c932fb6edf85f7cfa6ebd5980db6f5c2a6cce25254188b71f17340039ffbd8

  • SHA512

    7792aeb5803796fb9d2a41d454f41747d5e785fce0841bb98d6c4a5ab0dfb00f6366897c448ce878214408f885c56a51a3f83a93c46e5048fb37706c42c14313

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\AK.class
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AK.class
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AK.class"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    110cd9182f66c0730e6d2e9ee0d415d7

    SHA1

    34f20a891e0626452b19e2ec72c90827f2707eb5

    SHA256

    1cc651adbb0536642c660a5b2866ee569c0e8734a23d33676de53fbe39eaf7b3

    SHA512

    a83d389877612909b7c508f3d79278c5fa0c1c1d9990f5f03e353c37dc6a6ab33cc27fb93a4d744b4548b0b0cf88fee8b0c99df9d944ea9f316e3cbdbdfb6ffe