Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 19:12

General

  • Target

    #!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔/!~S͜͡etUp_F͜ile_Here٭✓.rar

  • Size

    7.1MB

  • MD5

    b603f9cb6aa3555adbd65607a29dbb80

  • SHA1

    9d9c946cd7a8f0b71b9f93e53bde504dc8c8fb3b

  • SHA256

    fa98d031493e3ad1ca230349317a8f27492069557bd958f256bf2a44f2681e99

  • SHA512

    ea856f6206e9eb3df773f5533ad5749368ca75e8ca40fd5aad6c98d95dddcd40671120b925d2688573376df16b8a1ecf57863e6a3a8444b5140c0362d493d6c6

  • SSDEEP

    196608:8/skCfkcAK7XtOoGc1Jfa8RU9107C9MOKTcmBsrO9dtFRY:aC8cnXHpU4+9MPBsrO9Vm

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔\!~S͜͡etUp_F͜ile_Here٭✓.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔\!~S͜͡etUp_F͜ile_Here٭✓.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔\!~S͜͡etUp_F͜ile_Here٭✓.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\#!!s͜͡etUp_Use_7713_P͜@s$C0DE!~!%!✔\!~S͜͡etUp_F͜ile_Here٭✓.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1572-30-0x000007FEFADB0000-0x000007FEFADE4000-memory.dmp

    Filesize

    208KB

  • memory/1572-29-0x000000013F550000-0x000000013F648000-memory.dmp

    Filesize

    992KB

  • memory/1572-32-0x000007FEFAB50000-0x000007FEFAB68000-memory.dmp

    Filesize

    96KB

  • memory/1572-33-0x000007FEF7210000-0x000007FEF7227000-memory.dmp

    Filesize

    92KB

  • memory/1572-35-0x000007FEF71D0000-0x000007FEF71E7000-memory.dmp

    Filesize

    92KB

  • memory/1572-34-0x000007FEF71F0000-0x000007FEF7201000-memory.dmp

    Filesize

    68KB

  • memory/1572-36-0x000007FEF71B0000-0x000007FEF71C1000-memory.dmp

    Filesize

    68KB

  • memory/1572-37-0x000007FEF67C0000-0x000007FEF67DD000-memory.dmp

    Filesize

    116KB

  • memory/1572-38-0x000007FEF6700000-0x000007FEF6711000-memory.dmp

    Filesize

    68KB

  • memory/1572-31-0x000007FEF5BC0000-0x000007FEF5E76000-memory.dmp

    Filesize

    2.7MB

  • memory/1572-41-0x000007FEF6130000-0x000007FEF6171000-memory.dmp

    Filesize

    260KB

  • memory/1572-48-0x000007FEF3AA0000-0x000007FEF3AB1000-memory.dmp

    Filesize

    68KB

  • memory/1572-52-0x000007FEF3960000-0x000007FEF39DC000-memory.dmp

    Filesize

    496KB

  • memory/1572-54-0x000007FEF36B0000-0x000007FEF3707000-memory.dmp

    Filesize

    348KB

  • memory/1572-55-0x000007FEF3680000-0x000007FEF36A8000-memory.dmp

    Filesize

    160KB

  • memory/1572-50-0x000007FEF3A50000-0x000007FEF3A80000-memory.dmp

    Filesize

    192KB

  • memory/1572-49-0x000007FEF3A80000-0x000007FEF3A98000-memory.dmp

    Filesize

    96KB

  • memory/1572-60-0x000007FEF35E0000-0x000007FEF35F2000-memory.dmp

    Filesize

    72KB

  • memory/1572-62-0x000007FEF3590000-0x000007FEF35A3000-memory.dmp

    Filesize

    76KB

  • memory/1572-61-0x000007FEF35B0000-0x000007FEF35D1000-memory.dmp

    Filesize

    132KB

  • memory/1572-59-0x000007FEF3600000-0x000007FEF3611000-memory.dmp

    Filesize

    68KB

  • memory/1572-58-0x000007FEF3620000-0x000007FEF3643000-memory.dmp

    Filesize

    140KB

  • memory/1572-57-0x000007FEF3920000-0x000007FEF3938000-memory.dmp

    Filesize

    96KB

  • memory/1572-56-0x000007FEF3650000-0x000007FEF3674000-memory.dmp

    Filesize

    144KB

  • memory/1572-39-0x000007FEF3FC0000-0x000007FEF5070000-memory.dmp

    Filesize

    16.7MB

  • memory/1572-47-0x000007FEF3AC0000-0x000007FEF3ADB000-memory.dmp

    Filesize

    108KB

  • memory/1572-53-0x000007FEF3940000-0x000007FEF3951000-memory.dmp

    Filesize

    68KB

  • memory/1572-46-0x000007FEF3AE0000-0x000007FEF3AF1000-memory.dmp

    Filesize

    68KB

  • memory/1572-45-0x000007FEF3B00000-0x000007FEF3B11000-memory.dmp

    Filesize

    68KB

  • memory/1572-44-0x000007FEF5790000-0x000007FEF57A1000-memory.dmp

    Filesize

    68KB

  • memory/1572-43-0x000007FEF6110000-0x000007FEF6128000-memory.dmp

    Filesize

    96KB

  • memory/1572-40-0x000007FEF3710000-0x000007FEF391B000-memory.dmp

    Filesize

    2.0MB

  • memory/1572-51-0x000007FEF39E0000-0x000007FEF3A47000-memory.dmp

    Filesize

    412KB

  • memory/1572-42-0x000007FEF57B0000-0x000007FEF57D1000-memory.dmp

    Filesize

    132KB