Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
hong.sh
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
hong.sh
Resource
win10v2004-20240802-en
General
-
Target
hong.sh
-
Size
808B
-
MD5
b7a7fe5697b4efebc9a5ba516205136d
-
SHA1
8f24afe50ee852f1eb8542b141c484219296723e
-
SHA256
e2b6fe979fefebc31f7ad78714b2b35d1e6c3e9cbd6439635dab5e1ce0f60cd0
-
SHA512
d9713ef40819080e69f264be2fa75cfeacaedb8118a4849dbc123531cd08ac5ea17f3b33e82bfbde30c1adc3ab69aa2dbbd122bf6a09ea9e05e86b83a1187319
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\sh_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2900 AcroRd32.exe 2900 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2064 2384 cmd.exe 31 PID 2384 wrote to memory of 2064 2384 cmd.exe 31 PID 2384 wrote to memory of 2064 2384 cmd.exe 31 PID 2064 wrote to memory of 2900 2064 rundll32.exe 33 PID 2064 wrote to memory of 2900 2064 rundll32.exe 33 PID 2064 wrote to memory of 2900 2064 rundll32.exe 33 PID 2064 wrote to memory of 2900 2064 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\hong.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\hong.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\hong.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b224dfbba919bd99e43012de6945d8cd
SHA1471f6bf79d5db6a68d1810cb2a4617636dee892f
SHA25619d162fc7576980dcaa01d31dcc5d1e674c0825dcde3c2520f2440d2d5d968d6
SHA51211eac0d372a711bb5add27d7f51539942e6daf56fb526eb449d065e1983b50cd30c6335900da63e6c4667a7fa163ca5ed0621691c8bdbedfc8a9f7e8b80916e7