Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 17:13
Behavioral task
behavioral1
Sample
02.08.2022128.sh
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
02.08.2022128.sh
Resource
win10v2004-20240802-en
General
-
Target
02.08.2022128.sh
-
Size
234KB
-
MD5
475625828e756610c6d83f82a1453e34
-
SHA1
f7386e3d57212bbe905eea9716ed21d597494d61
-
SHA256
d4c28d5ed3dc497da4e729621f95ef99234bbf701a446cccb0d7ea8989d0c26f
-
SHA512
c3885eb90cf9218802116f9f2b87202fdc8efe47b821c09315de034e919f948917b855128e7ae28b24bfad0899bd78692665e9d5e3a55bf9cd817dcc0e690dca
-
SSDEEP
6144:JLxzq2jlZwaooC4OLgDVgbwiaoMcSxODijQijQN889jQ:q2jlZwazNxZI1McLDisijn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2724 2584 cmd.exe 31 PID 2584 wrote to memory of 2724 2584 cmd.exe 31 PID 2584 wrote to memory of 2724 2584 cmd.exe 31 PID 2724 wrote to memory of 2740 2724 rundll32.exe 32 PID 2724 wrote to memory of 2740 2724 rundll32.exe 32 PID 2724 wrote to memory of 2740 2724 rundll32.exe 32 PID 2724 wrote to memory of 2740 2724 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\02.08.2022128.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\02.08.2022128.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\02.08.2022128.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b0a5805df43253cacd036c65bc0b500
SHA1f5b65db13f9eecbbdfad770d1c65a19bbbefdbda
SHA2564a16969fc04c7739d34d7e071df7999a82a1b9601850484b5034d89d2dd0a67c
SHA5120e830447e2ec31e889cb7779145a5927ffb7b853423e1cc9e8af4e0718ad4e829fb856a1607b6c28c17c042889de2b02b94336f1008d4263d858654becaa776a