Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 05:29

General

  • Target

    $PLUGINSDIR/app-64.7z

  • Size

    120.0MB

  • MD5

    518b4ec41bde2cffd5b69a617a197eef

  • SHA1

    083bec699240cf30f15a65ba81a6d98aeb92e685

  • SHA256

    7c036ee82fc3929ae7c8d9125f24dfd6bf8f80288c19be36d644c066d92515ff

  • SHA512

    320c130bc11cf15b41b211573549a6018e63dcf0a1ebe0e56c7a5d726509130f104ef1d29c6621877b7818895b729d6acaa384adec50cab6c5771b6c9298ce55

  • SSDEEP

    3145728:GTm4rKi1QPC7bY+wMOM0RN/dkdqOsHE1Zns6X7y7URui:GC4rLQ0bTwa4N/+qOsk1ZnsmmUoi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f8c257216645e1787e91a372818b0c7f

    SHA1

    a21b736479b7e1955243891cbf1038f6c940d715

    SHA256

    eeb65ecad6d5ec2d55d0d7390baa10df237523b95346fce4d047dcfbf5069dbf

    SHA512

    4589880ab2f4c42fac598ce3c681c68924687929a06298cd6e3a3e97265eb3bd22de73817e7aa28a9ce67e829025e9dd9c8b6d3f8f52f72d3c7606e7f103f96c