Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3Precision ...mp.rar
windows7-x64
3Precision ...mp.rar
windows10-2004-x64
Precision ...mp.exe
windows7-x64
1Precision ...mp.exe
windows10-2004-x64
1Precision ...ui.ini
windows7-x64
1Precision ...ui.ini
windows10-2004-x64
1Precision ...ut.txt
windows7-x64
1Precision ...ut.txt
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
Precision Free Temp.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Precision Free Temp.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Precision Free Temp/Precision Free Temp.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Precision Free Temp/Precision Free Temp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Precision Free Temp/imgui.ini
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Precision Free Temp/imgui.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Precision Free Temp/tut.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Precision Free Temp/tut.txt
Resource
win10v2004-20240802-en
General
-
Target
Precision Free Temp.rar
-
Size
571KB
-
MD5
a6641f0e08f4657a34119adb39659bc7
-
SHA1
2212fdd00ba430bc53abb06de39bb0864a9474f5
-
SHA256
108338f8f8404c1efd1dd2255582fb3ed0b707ff66661e70a7b2b985764c6d5d
-
SHA512
ee5f399110725ecae60615a9a403cd685ba1ff7c8a17c6a879639ca433ef25759f0143fdde6802d7b1ed0afb0702fe35d3afb95839caad64ad5a9ffcc7c60f8b
-
SSDEEP
12288:vO7//4UNc1SKBuMKijwmjBAvQtTnLyEkboOoH7yI3UQehF:I/wUNcAmtwmjmiDwboOoUQSF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1672 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1672 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe 1672 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2772 2316 cmd.exe 31 PID 2316 wrote to memory of 2772 2316 cmd.exe 31 PID 2316 wrote to memory of 2772 2316 cmd.exe 31 PID 2772 wrote to memory of 2760 2772 rundll32.exe 32 PID 2772 wrote to memory of 2760 2772 rundll32.exe 32 PID 2772 wrote to memory of 2760 2772 rundll32.exe 32 PID 2760 wrote to memory of 1672 2760 rundll32.exe 34 PID 2760 wrote to memory of 1672 2760 rundll32.exe 34 PID 2760 wrote to memory of 1672 2760 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Precision Free Temp.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Precision Free Temp.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Precision Free Temp.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Precision Free Temp.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
-