Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1370s
  • max time network
    1159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 09:52

General

  • Target

    ElectronV3.rar

  • Size

    11.0MB

  • MD5

    fae8140fc10e55657ec9998ed3f32a30

  • SHA1

    d27f46d9e120453a13c7f29b3833ec8ab660d3db

  • SHA256

    3f45b4acd905e47dbc1357ec44040af6e1fcb68fd09d8bacccad0d729be1d5da

  • SHA512

    ef4fef5be5a9548446c385a948286e47b1582ce2c355324618b905d2572b6d3d44a5a79f1a73238439e6d2f941a0628b1e0d68b01c82c2a95ea81d6d7e70444f

  • SSDEEP

    196608:EtWMBvqCsY56Pmf9niNjK1hP5dimc6O4kzIEYZa337rmcc3EV2c+LSneFrhf1Z:EggFs49i46xUh637AuVOS4rhf1Z

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ElectronV3.rar
    1⤵
    • Modifies registry class
    PID:5104
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:656
  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ResizeSend.png" /ForceBootstrapPaint3D
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:216
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
    1⤵
    • Drops file in System32 directory
    PID:4200
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:5080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4200-4-0x000001EE721A0000-0x000001EE721B0000-memory.dmp

    Filesize

    64KB

  • memory/4200-0-0x000001EE72160000-0x000001EE72170000-memory.dmp

    Filesize

    64KB

  • memory/4200-11-0x000001EE7A480000-0x000001EE7A481000-memory.dmp

    Filesize

    4KB

  • memory/4200-13-0x000001EE7A500000-0x000001EE7A501000-memory.dmp

    Filesize

    4KB

  • memory/4200-15-0x000001EE7A500000-0x000001EE7A501000-memory.dmp

    Filesize

    4KB

  • memory/4200-16-0x000001EE7A590000-0x000001EE7A591000-memory.dmp

    Filesize

    4KB

  • memory/4200-17-0x000001EE7A590000-0x000001EE7A591000-memory.dmp

    Filesize

    4KB

  • memory/4200-18-0x000001EE7A5A0000-0x000001EE7A5A1000-memory.dmp

    Filesize

    4KB

  • memory/4200-19-0x000001EE7A5A0000-0x000001EE7A5A1000-memory.dmp

    Filesize

    4KB