Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 17:21

General

  • Target

    Project-LSD-Gorilla-Tag-main/README.md

  • Size

    96B

  • MD5

    8f87ff22969f178a7e4f5a446506ba43

  • SHA1

    cb7cf905edc0f9433c3358ef3315d74adf8d8dde

  • SHA256

    25ed546714b7110d8c7fbd2c792714665f03f343ffc6e05d1f378fcb4afddc03

  • SHA512

    a6ee624a2be1841c8adc74c1a04b0c6031b9b7fd9d00ac83f4d53d5f31414926948784e2ce8151adc4d43d861f27cab9311954bedd5443383d5bb861c346ddf6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Project-LSD-Gorilla-Tag-main\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Project-LSD-Gorilla-Tag-main\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Project-LSD-Gorilla-Tag-main\README.md"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    ac5774946eb6f9c1d85eebb86235ad28

    SHA1

    f53380376cf621c1bd5b54ff50853fcd941e8e52

    SHA256

    7e2f0fcb7496907966b3041e45f6dc9c23e9cdd37d29fb7f249cb1f44b694946

    SHA512

    f034a101b7604bc53b8a65d544dcf61237339c7d2b23af11d4b758c088050895a05548aa04881d91845b6b82d39f0b2752e5cb1f883d28f897fbcbce8acc0363