Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅/₳DÐ✵SetUp✓.rar
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅/₳DÐ✵SetUp✓.rar
Resource
win10v2004-20240802-en
General
-
Target
!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅.rar
-
Size
2.6MB
-
MD5
7d14bf06a11824a580a50bd1aa8ddd7f
-
SHA1
ffe3052f1647d5c4567032d914d7c56ee46bb44d
-
SHA256
77b4e8422aba2a596681cf65facf129a283ba46796920992e2530a348c814e50
-
SHA512
014b3a1be17044041aacd318d07400c3a67b8db85c9db762f9b670059c5f9542a00f99d7aac44c5dcd633aff8eda6d76a15970788ac815d465188352030ed658
-
SSDEEP
49152:8EO5bfFi4uis3Uxi3j9stl03YkqCVgJLD2Du/CordTNkSFpUz5rqf2papYv7KNcT:8EOtFe350l0RfVgYQTdTNFFI1papYjKK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2356 2376 cmd.exe 31 PID 2376 wrote to memory of 2356 2376 cmd.exe 31 PID 2376 wrote to memory of 2356 2376 cmd.exe 31 PID 2356 wrote to memory of 2160 2356 rundll32.exe 32 PID 2356 wrote to memory of 2160 2356 rundll32.exe 32 PID 2356 wrote to memory of 2160 2356 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅.rar3⤵
- Modifies registry class
PID:2160
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2648