Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 07:48

General

  • Target

    01e64ddd5fd040141a53280dfdc7bffa/asset.meta

  • Size

    188B

  • MD5

    e29f9fdb35cd9c9d0fea2f8f7fd3e5d9

  • SHA1

    aedd8bde4eace9f299442dc29c2c041341a24066

  • SHA256

    26c1cf5b148fa56cf356a46315b1fb0fa9f4160b03af2c456d0834d1fd117cae

  • SHA512

    9b26da4e30b91da41a010fd4f904ef3038b885fa3fad096daa1a278bcc03a4b53b217c3102c5409f3ba0c19e5ce089876d8a5b93208c84e3afca1babbb73e64e

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\01e64ddd5fd040141a53280dfdc7bffa\asset.meta
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\01e64ddd5fd040141a53280dfdc7bffa\asset.meta
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\01e64ddd5fd040141a53280dfdc7bffa\asset.meta"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1a1e4d85adf8d927d4f5e4b0b2b06d00

    SHA1

    4c77c3a7fb40ae6900d94fb8e6c9c75bbc5fe155

    SHA256

    8d6189891c4f79b20543dc4e939b9fc29308fea682bfa1551820940c362ca5aa

    SHA512

    3780855493a3ff39810549d0567860bee1dbdaa2e39da37fe348be5909ff811f08b1d3f62024acd9c6e32db8ca3920512c69dd16ac7b90f2534d44d87807e5e5