Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 12:54 UTC

General

  • Target

    Nezur_Interface.exe.WebView2/EBWebView/CrashpadMetrics-active.pma

  • Size

    16KB

  • MD5

    cbb7b43e319785607876914fb737a32b

  • SHA1

    e921e4b2602a9316d1104d7adc24e497b106c916

  • SHA256

    ad9334d3318afea2d3c9c4f42b94a040c8bf657d612825573fc2b2d1189d3090

  • SHA512

    655624930fcd93332cab1269c3c8afe9a69bd12ea7931627691c3a074de4f09a21168eb6c8350fec280739f0425267c8ffcf124ab93723a12fcbec46cdbaaa9c

  • SSDEEP

    12:bCsEXhVMMBKiSCemJKlkQyqXxVhYJ0I+pPK6BsyW1inP6:bCPROMMiS+MkgxYWIE1BtXP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Nezur_Interface.exe.WebView2\EBWebView\CrashpadMetrics-active.pma
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nezur_Interface.exe.WebView2\EBWebView\CrashpadMetrics-active.pma
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nezur_Interface.exe.WebView2\EBWebView\CrashpadMetrics-active.pma"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0dc1712f2aef5c22cbfd148e37bb854c

    SHA1

    a4b9d9f6b419462a8faa7382ec2e1726963da797

    SHA256

    363cd9481db9f9fe42ff70644051c4a53ae6a733c83314eab3e608fb694e3c5e

    SHA512

    8597fb2217d873b876ac15530104a1a47b606791be462318729be44ee4c85df630751951879227d72d7f1bc6f68e71a76a337ef161dd0158801eed4304883ccf

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.