Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    70s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 17:13

General

  • Target

    Nouveau dossier.7z

  • Size

    414KB

  • MD5

    8be76a2461a61ec06e7a14f5613cd19d

  • SHA1

    f087045a1180890860a105d1ac37c7f040056d99

  • SHA256

    6aee4cdeb3263cc306d538c7eeaaaffa48ebb7bfa6e3cbe6641f413def336fbd

  • SHA512

    28afc744e78c182dd07572e92a388ada00f738e0d06458c76176e0ea9b68b30ca7edb6b3e4e66d92bc79c08639e7923ff09de7fd2ea9e1d713c78e4c84f9a6af

  • SSDEEP

    12288:rHhd0mGwaU4Sq3X6jqHrilpIBwXICCuz5IK:rnz4SGUAri7IBYICR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Nouveau dossier.7z"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nouveau dossier.7z
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nouveau dossier.7z
        3⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Program Files\7-Zip\7zFM.exe
          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Nouveau dossier.7z"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1848
  • C:\Users\Admin\Desktop\clumsy.exe
    "C:\Users\Admin\Desktop\clumsy.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:1796
  • C:\Users\Admin\Desktop\clumsy.exe
    "C:\Users\Admin\Desktop\clumsy.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\config.txt

    Filesize

    1KB

    MD5

    50cfd541a72f15260a0edbee28cefe08

    SHA1

    3b1382b43bf38f43b70abd6f2406b29b0f9eb930

    SHA256

    4dea14ed09ea56b850a8fd52d321ccbd070a88652447e88fe12eb14efd790cd5

    SHA512

    51ed17aac7d723047372d904b67dda0fddf66361762ec90997604044675c6028e782a169215a5b14c49d6c09add771d38580d28ff572e2489fc917ec80244fdb

  • \Users\Admin\Desktop\WinDivert.dll

    Filesize

    46KB

    MD5

    88e1c19b978436258f7c938013408a8a

    SHA1

    09b77c8c85757e11667a7b83231598dd67fe0b8b

    SHA256

    6110bfa44667405179c3e15e12af1b62037e447ed59b054b19042032995e6c7e

    SHA512

    eaa0d8369b76fd9a4978f14702716ae31d801cd0dc36a86531f9320b4ddb683265c4f0e07af2b9d2e85f513270d98d1b11ae7d501d08287442bc505176d16e14

  • \Users\Admin\Desktop\clumsy.exe

    Filesize

    1.4MB

    MD5

    e08b34a17ffb179d98d3452107e07189

    SHA1

    f89c80d58497e88577f77d21f44c08d0ff89cdc4

    SHA256

    088d012a3d2788f797faf54d4f3db945c84ddab03a656c24d3badb06ae74324e

    SHA512

    e3dc85f8134fd09a725a0081efbb8816b82e61131e6c98882dda44b10467f7042f6bd9b30854d4a4f8c6e0449132b8d27aebac58fed2c15fc7dd81178db63d5f

  • memory/1796-44-0x0000000062800000-0x0000000062813000-memory.dmp

    Filesize

    76KB

  • memory/2660-24-0x0000000003CC0000-0x0000000003CD0000-memory.dmp

    Filesize

    64KB