Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 15:00

General

  • Target

    workspace/5972698540.rbxlx

  • Size

    9.4MB

  • MD5

    02202c7b8652c63a685f1c95354f6dc6

  • SHA1

    bc1ad1ba92ed8db4996f49d6608fbffc6815fd18

  • SHA256

    881badb8cfb346b25575c5ddf7ba6f2195a2947ebedf9e2450abefe10b94d253

  • SHA512

    e7fb58a1d8e78df7879b8eb667360f9978ea2c8537f47afb7ad38877ba214fa88c6d75040db2c04eb2379d82fb46977d431e4bade149f629b339ac4ce13351b7

  • SSDEEP

    196608:hhjDn+cccccccccqqqqqoqccqqqqqqv5Du7ccccccLLccccLLcccccLLccccc77g:0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\workspace\5972698540.rbxlx
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\workspace\5972698540.rbxlx
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\workspace\5972698540.rbxlx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7dd69c44172c6cacf1175846a8f61162

    SHA1

    45ea2330c60fd8e0558b88bb9537aa4de02f1c86

    SHA256

    146c1339f7c953ddc0a13c2cf2f40c21fd0f9a1686ed4a29ca7a737988f0037c

    SHA512

    1d65e508ca603341603bd8b6c84f74f043bc7f4996fb055d0c29eabc2f45c6121b53f97284e0bd7aeadf1893fda2b9e2493cd4d051cd823affc9b1d5d9d3ca87