Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
Shure64x.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Shure64x.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Shure64x.msi
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Shure64x.msi
Resource
win10v2004-20240802-en
General
-
Target
Shure64x.rar
-
Size
85.9MB
-
MD5
d7f28ac8dbd44620cc63eea8906ad5d4
-
SHA1
51a53d4f8f5170e8adcb95e1d48ee2c06c24bdbe
-
SHA256
086cfceeba52ec0e5effd32321b9fdbcf7b3f674839b30749059e4275af08363
-
SHA512
818d3610ff1494ba546740010b73d62cf020b3fd7751f5d1d414d9d6cae690ef40a35803753e6ff7ebe71c0c952dc1fd987fd05a9333fb48f6e550e7e1eebe1f
-
SSDEEP
1572864:CM9izJ+CkO0TszUlwcJrWtoycneVvXeVClCR7U613bmSdw23vsIXsQRiY9AdM/kp:bMJ3kO0Tikw1oycnqvXe0Cx1JC20IcuE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1092 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1092 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe 1092 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1092 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1796 3004 cmd.exe 30 PID 3004 wrote to memory of 1796 3004 cmd.exe 30 PID 3004 wrote to memory of 1796 3004 cmd.exe 30 PID 1796 wrote to memory of 2744 1796 rundll32.exe 31 PID 1796 wrote to memory of 2744 1796 rundll32.exe 31 PID 1796 wrote to memory of 2744 1796 rundll32.exe 31 PID 2744 wrote to memory of 1092 2744 rundll32.exe 33 PID 2744 wrote to memory of 1092 2744 rundll32.exe 33 PID 2744 wrote to memory of 1092 2744 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Shure64x.rar1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Shure64x.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Shure64x.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Shure64x.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
-