Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2024, 16:17

240901-trljeswakm 5

01/09/2024, 16:16

240901-tq323swemd 10

Analysis

  • max time kernel
    14s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/09/2024, 16:17

General

  • Target

    LC_Installer.rar

  • Size

    513KB

  • MD5

    7d42f36b96a309f7837a55bb4db5f9f6

  • SHA1

    89a3d5469d80faa6ca2609bf72e36f93af93e9ce

  • SHA256

    8cd33856bc6d80865b214213ea6d719d9ebcfcb1beab3e53bfef325c8f12362f

  • SHA512

    1af71d478fdd0ef4ec33bab30d96dd862256798ad378e250fae130f84d9a6b6dca3ea527300ae697e77620961f7da379be285cfa322c1a1227789e0759b7b8e3

  • SSDEEP

    12288:oc0deoGP1vA+cAjoUhy7Vgb+Klesm9Cl0H1Q8kvdbTokRSWKXC:oc07GNvA+VG+0y7FHPSWp

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\LC_Installer.rar
    1⤵
    • Modifies registry class
    PID:3852
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\LC_Installer.rar"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:808
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/808-17-0x00007FF6470E0000-0x00007FF6471D8000-memory.dmp

      Filesize

      992KB

    • memory/808-18-0x00007FFA25C90000-0x00007FFA25CC4000-memory.dmp

      Filesize

      208KB

    • memory/808-19-0x00007FFA10560000-0x00007FFA10816000-memory.dmp

      Filesize

      2.7MB

    • memory/808-20-0x00007FFA0F280000-0x00007FFA10330000-memory.dmp

      Filesize

      16.7MB