Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1561s
  • max time network
    1563s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 02:04

General

  • Target

    MHDDoS-2.4/README.md

  • Size

    9KB

  • MD5

    7f6f963b6e685bef31e6df58ecc15785

  • SHA1

    054bfe9600cda391dc05e91e552cd06d49fd03a4

  • SHA256

    c939d0f555cdfc92dddb953d984ef2c6680f2da0f849d0abbbd51107884991c7

  • SHA512

    42e5b740e1dfc428ef721c7de8de96fc9ed5e018e1f03d04d2ce691c525560339af5746a047026d8794082352c98dd4b441f327c8f4b67fa98288ab0a72f8fbc

  • SSDEEP

    192:U0Lf8Lj0W8hG+ge8Sv+j6gr1yt+0cBe0xZUUjVmNyDN3WFuQXMA3NCKElk2x1:U0LfUWG1eIi/cBVMUBmNyDN3WFBh3/EX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MHDDoS-2.4\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MHDDoS-2.4\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MHDDoS-2.4\README.md"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e9d66c495bce71b410cc171aa22304c5

    SHA1

    42383a04ef8fe84d7d1397a5ea5ddb669ca55415

    SHA256

    4f62c58f78e77694ec89285e7a439e754005baf996cb0602befb42139a3646f2

    SHA512

    42134f2569307abfd6b2d9d58850c1d0003da7df87fcd61f71a4c04293e542be8e03d1c20125f5319a06316e6352513e887d184b09f2e800af8f3a9b1f2cdf2b