Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 23:28 UTC

General

  • Target

    scph39001.bin

  • Size

    4.0MB

  • MD5

    d5ce2c7d119f563ce04bc04dbc3a323e

  • SHA1

    f9a5d629a036b99128f7cb530c6e3ca016e9c8b7

  • SHA256

    f4c948e61a291d4b3f92a141e550cf8357204287a31ff784caccbedaef910c9d

  • SHA512

    9c1bacb8996a084f91124ea4e36cea7ed303ae90ede320ca79f070a2f5ee51c5e4b6297c9e3e20d88391e3a7ba78eca61a55f4aabc4fac2b944c3458cad845f6

  • SSDEEP

    49152:3l4rLTETm8tXP/D4qvBG92oqcwsU38MHlvG135t20Eh:3l4LxIBqD6VMCG1pY0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\scph39001.bin
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\scph39001.bin
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\scph39001.bin"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8ccd19249b6da9e0326a24580e8d4fa0

    SHA1

    e4c1d34c29d3d1cc68686b84f376d6b55c32a407

    SHA256

    79d3bbd47b9efac093d5bb2784189aaf292eddc7894af1f6ad6837dc749828aa

    SHA512

    18b35f1d5aceb1e1b837aaa0b0da4eade44cef09aceac1799c4d6b1242a669018854f101caf314e3620bf0adff083e7751c64f0614048b75adea513357ff787f

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.