Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
91dfcbce7b2011145d9de4c989492314f6e133723f67f2edd8cbcc4eeef90da0.sh
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
91dfcbce7b2011145d9de4c989492314f6e133723f67f2edd8cbcc4eeef90da0.sh
Resource
win10v2004-20240802-en
General
-
Target
91dfcbce7b2011145d9de4c989492314f6e133723f67f2edd8cbcc4eeef90da0.sh
-
Size
775B
-
MD5
20c188bd72095fac821b394fac79cecd
-
SHA1
a7217584b9cfb88f93fe05a157d19fb852124fc3
-
SHA256
91dfcbce7b2011145d9de4c989492314f6e133723f67f2edd8cbcc4eeef90da0
-
SHA512
abd4da5f5005008f5b8ffd1f7043c92ca257a200a3e3b68326d6ec29c40319f097468f9827553b01eca3581f71a5b3ee012905f0c39325e5f9519e6a0a25a705
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\sh_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\sh_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2812 AcroRd32.exe 2812 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2348 2280 cmd.exe 31 PID 2280 wrote to memory of 2348 2280 cmd.exe 31 PID 2280 wrote to memory of 2348 2280 cmd.exe 31 PID 2348 wrote to memory of 2812 2348 rundll32.exe 32 PID 2348 wrote to memory of 2812 2348 rundll32.exe 32 PID 2348 wrote to memory of 2812 2348 rundll32.exe 32 PID 2348 wrote to memory of 2812 2348 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\91dfcbce7b2011145d9de4c989492314f6e133723f67f2edd8cbcc4eeef90da0.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\91dfcbce7b2011145d9de4c989492314f6e133723f67f2edd8cbcc4eeef90da0.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91dfcbce7b2011145d9de4c989492314f6e133723f67f2edd8cbcc4eeef90da0.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD573ddad1a4e87612765b072499124497f
SHA1f18b9ed54e3b8b37aeca4df0331a912f781b582e
SHA2565f49d9f1ae6b41af35ef3d45f4d3c6656c2609ca5dec2ef1ba95200061b48359
SHA5126ae45ed03574b3be13319b401231ded067e0fc7263e7619eee6ccbd0d65145041a1e425779d23b0c4900a8e41400bdf35773b5ab91060f97b9a067f5331c0775