Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 18:53

General

  • Target

    zhongaclient by zhong 0.0.7 p75/manifest.json

  • Size

    794B

  • MD5

    2e164252232daaff953ec9c071f3921f

  • SHA1

    99d67eafb0342b9d4b42b05c25f13d9f821e878d

  • SHA256

    efb0e5d483e644f6fb8fc58ff4e87bf6f12d66d681b1cd52d53f130b17b07116

  • SHA512

    236c3e553b846bdd4d135a74cbb048637bb251cc0f97f179609fb3b3ecbc5a65d73ccdbe75a904204948fcc48d01683122abf90329f35f16e00617a3d2749a55

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\zhongaclient by zhong 0.0.7 p75\manifest.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\zhongaclient by zhong 0.0.7 p75\manifest.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\zhongaclient by zhong 0.0.7 p75\manifest.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    81b6fbcd9ebc8c0538e169b4a1a532f0

    SHA1

    8f7364de61b75bb8710c49ea6478150e57baa430

    SHA256

    beb2a514dbb8e82f288cdc71be5b5a47119abbe83d5dd812cc2eca50095cc406

    SHA512

    b2fbabf5a835d8629ed99b9b96876532338f5b5843577ce8282661bbdefa08f728adf040d35ed085a123a83953ada8a006ea51e5136c76b81cbc5eeaf8f93a7a