Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/08/2024, 21:21

240809-z7jmnatdkf 3

09/08/2024, 21:19

240809-z6hzqstcqe 3

Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 21:19

General

  • Target

    !~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅/₳DÐ✵SetUp✓.rar

  • Size

    2.5MB

  • MD5

    bdd089875f0874a04f50a684da977240

  • SHA1

    b7aef663445d25f21d24cfae1e147f46cf3efbac

  • SHA256

    560547309ef5a41b87ac0d083d1dad7e10c483cb664cf79fa13250edcce94e54

  • SHA512

    1bdeef8497477dcc8588dd3ba4c31a1a85636760c79b527d16175f1ccc42afb0f973c57fc37457c17d60c758cf453694e959fe0751bc68703019ec7907303a60

  • SSDEEP

    49152:tEO5bfFi4uis3Uxi3j9stl03YkqCVgJLD2Du/CordTNkSFpUz5rqf2papYv7KNcy:tEOtFe350l0RfVgYQTdTNFFI1papYjK1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅\₳DÐ✵SetUp✓.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅\₳DÐ✵SetUp✓.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅\₳DÐ✵SetUp✓.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\!~#Open・s͜͡etUp・8207・P͜aꞩśWØȓÐ~!$$✅\₳DÐ✵SetUp✓.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1916-29-0x000000013FB50000-0x000000013FC48000-memory.dmp

    Filesize

    992KB

  • memory/1916-30-0x000007FEFB1B0000-0x000007FEFB1E4000-memory.dmp

    Filesize

    208KB

  • memory/1916-35-0x000007FEF7B50000-0x000007FEF7B67000-memory.dmp

    Filesize

    92KB

  • memory/1916-37-0x000007FEF6FB0000-0x000007FEF6FCD000-memory.dmp

    Filesize

    116KB

  • memory/1916-36-0x000007FEF7980000-0x000007FEF7991000-memory.dmp

    Filesize

    68KB

  • memory/1916-34-0x000007FEFB150000-0x000007FEFB161000-memory.dmp

    Filesize

    68KB

  • memory/1916-33-0x000007FEFB170000-0x000007FEFB187000-memory.dmp

    Filesize

    92KB

  • memory/1916-31-0x000007FEF6330000-0x000007FEF65E6000-memory.dmp

    Filesize

    2.7MB

  • memory/1916-32-0x000007FEFB190000-0x000007FEFB1A8000-memory.dmp

    Filesize

    96KB

  • memory/1916-39-0x000007FEF6F90000-0x000007FEF6FA1000-memory.dmp

    Filesize

    68KB

  • memory/1916-38-0x000007FEF6120000-0x000007FEF632B000-memory.dmp

    Filesize

    2.0MB

  • memory/1916-40-0x000007FEF6F40000-0x000007FEF6F81000-memory.dmp

    Filesize

    260KB

  • memory/1916-41-0x000007FEF6F10000-0x000007FEF6F31000-memory.dmp

    Filesize

    132KB

  • memory/1916-42-0x000007FEF6EF0000-0x000007FEF6F08000-memory.dmp

    Filesize

    96KB

  • memory/1916-43-0x000007FEF69C0000-0x000007FEF69D1000-memory.dmp

    Filesize

    68KB

  • memory/1916-44-0x000007FEF69A0000-0x000007FEF69B1000-memory.dmp

    Filesize

    68KB

  • memory/1916-46-0x000007FEF6980000-0x000007FEF6991000-memory.dmp

    Filesize

    68KB

  • memory/1916-47-0x000007FEF6960000-0x000007FEF697B000-memory.dmp

    Filesize

    108KB

  • memory/1916-48-0x000007FEF6100000-0x000007FEF6111000-memory.dmp

    Filesize

    68KB

  • memory/1916-49-0x000007FEF60E0000-0x000007FEF60F8000-memory.dmp

    Filesize

    96KB

  • memory/1916-50-0x000007FEF60B0000-0x000007FEF60E0000-memory.dmp

    Filesize

    192KB

  • memory/1916-62-0x000007FEF2160000-0x000007FEF2177000-memory.dmp

    Filesize

    92KB

  • memory/1916-61-0x000007FEF2180000-0x000007FEF2300000-memory.dmp

    Filesize

    1.5MB

  • memory/1916-45-0x000007FEF4750000-0x000007FEF5800000-memory.dmp

    Filesize

    16.7MB

  • memory/1916-60-0x000007FEF5E50000-0x000007FEF5E62000-memory.dmp

    Filesize

    72KB

  • memory/1916-59-0x000007FEF5E70000-0x000007FEF5E81000-memory.dmp

    Filesize

    68KB

  • memory/1916-58-0x000007FEF5E90000-0x000007FEF5EB3000-memory.dmp

    Filesize

    140KB

  • memory/1916-57-0x000007FEF5EC0000-0x000007FEF5ED8000-memory.dmp

    Filesize

    96KB

  • memory/1916-56-0x000007FEF5EE0000-0x000007FEF5F04000-memory.dmp

    Filesize

    144KB

  • memory/1916-55-0x000007FEF5F10000-0x000007FEF5F38000-memory.dmp

    Filesize

    160KB

  • memory/1916-54-0x000007FEF5F40000-0x000007FEF5F97000-memory.dmp

    Filesize

    348KB

  • memory/1916-53-0x000007FEF5FA0000-0x000007FEF5FB1000-memory.dmp

    Filesize

    68KB

  • memory/1916-52-0x000007FEF5FC0000-0x000007FEF603C000-memory.dmp

    Filesize

    496KB

  • memory/1916-51-0x000007FEF6040000-0x000007FEF60A7000-memory.dmp

    Filesize

    412KB