Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 20:24

General

  • Target

    archi0108_9.7z

  • Size

    11.4MB

  • MD5

    615607ee508167cfafa68adfcd001edf

  • SHA1

    39a95e105fa0773d455875292bdcf4bfa9517cec

  • SHA256

    f9823fd8153a44b721f9eddded76a1042ab4d229b8bbd829c1f06c7b3539b48e

  • SHA512

    64099c923393aaac1dc97a6ef4aeb3ae0b8b880509c0cefb2b1bb10659ac28223237f94cc3354cab3f57f18b8910a7e71b5b7dddb3cc9810a878ef8863f850da

  • SSDEEP

    196608:kD/HTIqPv7oJUoYzxscWmklCKeclfu9kkwQ2b1LyylEVlGr20AcgFplqvK:0HTIcv7osxX8fuukwQexyylslK20Ac2B

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\archi0108_9.7z"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1287b8a59828591e20e47d595fc0522e

    SHA1

    c8306c49360fe902b2f263f35382d98978457b1f

    SHA256

    681a09e666a002aa2907bb9ac8e2d4fd109454560fdf3ab84ddc40b4c1eb8cca

    SHA512

    7048a9d8e85ddcd7f37cfd072bc15a53a56e54d54937586a963be638da555df2d126e4bf9b22ee369ca8ff289a4c7aa7372cf4aed38d6836ee0c9d1fd0f00d9b