Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
modified OC shipment 211014093.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
modified OC shipment 211014093.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
modified OC shipment 211014093.iso
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
modified OC shipment 211014093.iso
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
modified OC shipment 211014093.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
modified OC shipment 211014093.exe
Resource
win10v2004-20240802-en
General
-
Target
modified OC shipment 211014093.rar
-
Size
1.6MB
-
MD5
eacb8e7717b6d2ec052d515153b55537
-
SHA1
649af51682c8ec04551037cc5c1d6c080c2cb21f
-
SHA256
2cbf42842fdda3cbf6587cc6f805c688a2a2a38206fab1e39969fbb101b922b0
-
SHA512
04c9318d91c01541b0122cb0f5fdeca59ecb6e5c303289f306ccecc7cffa598dfbfe79797e5bf58b2a61d177523f64df384d96a388d154b6284b05cd453f5b44
-
SSDEEP
49152:ry0vWMq29k/iriBmTM/+E/CRHci5eiPSgRu:VzciI/nccWPSgw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1432 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1432 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe 1432 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1432 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2744 2756 cmd.exe 31 PID 2756 wrote to memory of 2744 2756 cmd.exe 31 PID 2756 wrote to memory of 2744 2756 cmd.exe 31 PID 2744 wrote to memory of 2572 2744 rundll32.exe 32 PID 2744 wrote to memory of 2572 2744 rundll32.exe 32 PID 2744 wrote to memory of 2572 2744 rundll32.exe 32 PID 2572 wrote to memory of 1432 2572 rundll32.exe 34 PID 2572 wrote to memory of 1432 2572 rundll32.exe 34 PID 2572 wrote to memory of 1432 2572 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\modified OC shipment 211014093.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\modified OC shipment 211014093.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\modified OC shipment 211014093.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\modified OC shipment 211014093.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
-