Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/08/2024, 02:07 UTC

240830-cj8wbasbqc 3

30/08/2024, 02:00 UTC

240830-ce8pra1hrc 1

30/08/2024, 01:56 UTC

240830-ccx58s1grb 8

30/08/2024, 01:52 UTC

240830-cadc2s1fqg 1

30/08/2024, 01:45 UTC

240830-b6ltma1eke 8

30/08/2024, 01:42 UTC

240830-b4pgqs1dla 8

Analysis

  • max time kernel
    102s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2024, 02:07 UTC

General

  • Target

    apt/sources.list.d/pop-os-apps.sources

  • Size

    131B

  • MD5

    60ce88c39bef4c7bd3d92da9e7884b38

  • SHA1

    565dc6845bf1432eadd9c1a0d4c1d31c8191ab3c

  • SHA256

    643b590f1d408d65ebbfea15b9864a338aeba6f28f09c8eee9e5c509f3abbc49

  • SHA512

    8d04cc73a3e4a9781bc6db3293e1f5ba2733da282c1481771f81dc5c5677ca8947dd496572fab0ececb842f5617538696e1a46fdba4b71969348942d9066325e

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\apt\sources.list.d\pop-os-apps.sources
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\apt\sources.list.d\pop-os-apps.sources
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\apt\sources.list.d\pop-os-apps.sources"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3f261a8a5ecc4d241095a1ea67ff6b49

    SHA1

    412904fa698dc0ec2d944e90b5625872273bd589

    SHA256

    5f082fd830295d8285f1ee65535409c36ad227a5c1096262e2346f749a159a3a

    SHA512

    8b7ba6de4738c909d4a00614ee71509c1bbdecf0501f3ec2f719fa02146c9fbe58f405f904c8f414944b49c01995d7781c6474272eb6682f24e2e38608bf5264

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.