Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 12:28

General

  • Target

    Lossless.Scaling.Build.15329896/Shaders/ANIME4K_M_2.cso

  • Size

    5KB

  • MD5

    c971e7b80299a880827cc65021d0e631

  • SHA1

    647fd21a64e2caadb20ce2eac2b4e73b5925f6de

  • SHA256

    a8792e1ee521c9f6e5199ad1597e7be89f01dfdd371173af1635b9374b427d73

  • SHA512

    bc189966033967e925a0bfd80fa761a1481f8ca51b5ab8480b6f20ad41869ca922a49635bd073f3b86ed34f9fd8dfdac0245d6a428d155aeec16ce60ef1ec5b8

  • SSDEEP

    96:YwSlDKeb07k0tw/I+WEtcQvnZeKepZcHR04fobPQrhfP6YYsRf+t1bguqfdMkBrv:ElRQ7kUqPUKwZcHR0MoPQrlP6YTV+t1+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Lossless.Scaling.Build.15329896\Shaders\ANIME4K_M_2.cso
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lossless.Scaling.Build.15329896\Shaders\ANIME4K_M_2.cso
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lossless.Scaling.Build.15329896\Shaders\ANIME4K_M_2.cso"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0c597a134f19754c300ba688d75038ad

    SHA1

    0e6e328e5ec2bd3f86839a1bd464c1009b9a1a4f

    SHA256

    3796c07b2ba1730de4968dc5613349da35204dc29ac5aa55ef80687f5d342fd5

    SHA512

    0f921039848af977390485784dcfcd42e7674188a447b2e8bf7bd5664529570d7b060ed90983300b6bc14dc21824915d6cf2251be1e19e9da78a185caae02f06