Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
archi0108_9.7z
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
archi0108_9.7z
Resource
win10v2004-20240802-en
General
-
Target
archi0108_9.7z
-
Size
11.4MB
-
MD5
615607ee508167cfafa68adfcd001edf
-
SHA1
39a95e105fa0773d455875292bdcf4bfa9517cec
-
SHA256
f9823fd8153a44b721f9eddded76a1042ab4d229b8bbd829c1f06c7b3539b48e
-
SHA512
64099c923393aaac1dc97a6ef4aeb3ae0b8b880509c0cefb2b1bb10659ac28223237f94cc3354cab3f57f18b8910a7e71b5b7dddb3cc9810a878ef8863f850da
-
SSDEEP
196608:kD/HTIqPv7oJUoYzxscWmklCKeclfu9kkwQ2b1LyylEVlGr20AcgFplqvK:0HTIcv7osxX8fuukwQexyylslK20Ac2B
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1204 AcroRd32.exe 1204 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2700 3016 cmd.exe 31 PID 3016 wrote to memory of 2700 3016 cmd.exe 31 PID 3016 wrote to memory of 2700 3016 cmd.exe 31 PID 2700 wrote to memory of 2740 2700 rundll32.exe 33 PID 2700 wrote to memory of 2740 2700 rundll32.exe 33 PID 2700 wrote to memory of 2740 2700 rundll32.exe 33 PID 2740 wrote to memory of 1204 2740 rundll32.exe 35 PID 2740 wrote to memory of 1204 2740 rundll32.exe 35 PID 2740 wrote to memory of 1204 2740 rundll32.exe 35 PID 2740 wrote to memory of 1204 2740 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51287b8a59828591e20e47d595fc0522e
SHA1c8306c49360fe902b2f263f35382d98978457b1f
SHA256681a09e666a002aa2907bb9ac8e2d4fd109454560fdf3ab84ddc40b4c1eb8cca
SHA5127048a9d8e85ddcd7f37cfd072bc15a53a56e54d54937586a963be638da555df2d126e4bf9b22ee369ca8ff289a4c7aa7372cf4aed38d6836ee0c9d1fd0f00d9b