Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 13:00

General

  • Target

    TheMEMZ/.git/objects/pack/pack-4ea3396b1580523e2fd09fe8a602f32bf7d5edfe.pack

  • Size

    136KB

  • MD5

    7da21f96b80f718168e43129dbf124be

  • SHA1

    2e72f21193f38db3226599fd9cc8309af5070965

  • SHA256

    fa0b9971a730309db7dae415f4bb09c843aec99596cbe04953b5830e67b46b84

  • SHA512

    06ff82e8a6facefedee606aa63b363c6a30f62041ed29f88fb9806066aebcf71b19515e7fc98bcb621b394387606880b021655e139691e4941908a20feb079df

  • SSDEEP

    3072:O/TS1uxdX72muKolUbn1GJxhmCLlB+5zlkKCv7VSCgwdNs:Mm6olmUJXm+/wHCTQCgw2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\TheMEMZ\.git\objects\pack\pack-4ea3396b1580523e2fd09fe8a602f32bf7d5edfe.pack
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TheMEMZ\.git\objects\pack\pack-4ea3396b1580523e2fd09fe8a602f32bf7d5edfe.pack
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TheMEMZ\.git\objects\pack\pack-4ea3396b1580523e2fd09fe8a602f32bf7d5edfe.pack"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c14e5b33600f1b23e65ddc8dcac10106

    SHA1

    f71eda5a0618b301437c8052788b54df3085d318

    SHA256

    854d2b66908555ca961d2e78b4ecfdf5f099981e2c3f0d26bdb1c0e6c1e0457a

    SHA512

    553addef7f62540a275941411ddfe9aae568e387caf6055b6c14ac4a0f07482ff2543cf6c45a92f93852b556e8998ceac68e19f4f8b9d37b416bd7168cc01c85