Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 15:00

General

  • Target

    workspace/4483381587.rbxlx

  • Size

    123KB

  • MD5

    cf2569d11765a4b9f80950fad360b059

  • SHA1

    3f880661d1997218f99dc83bbea98b2a6fd550ff

  • SHA256

    96533399c8c8a60a6b083cc4310175009b2c51193d93e2e78563526cc00369e4

  • SHA512

    280ce7e125498309cbc6dae546ce61f9a40745108779987e20c795c47eaea7deab37e73b9345854462d3c8ae3edf0e5fe9904fecec2028f68ad0024e9dfe6e97

  • SSDEEP

    192:fIdAHP9VLMP838hQy4ioBU4mW7Kc+KcJKBmW7Kc+KcJK5mW7Kc+KcJKfmW7Kc+Kv:wdAHPfLMPauQyQBU+s0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\workspace\4483381587.rbxlx
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\workspace\4483381587.rbxlx
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\workspace\4483381587.rbxlx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    780618bb74f480e4ff762d60b30d4488

    SHA1

    f5644b7ae1ba55c4211d8c3c92c4813e2136137e

    SHA256

    eda19cdbb2315b960721643ecebd45add63d2082f42ff62ab8d22e5c80fbc3b6

    SHA512

    40037001562821bdaceb63a862dbb662651490d7f605aaa1b4f503cfffd6ab7c9c4e65aa152a16d8df0488813d94c7c1ae96c1221930fcf9e191ba17d59f6240