Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 00:51

General

  • Target

    Bartender 5 5.0.27/.background/bg.png:com.apple.lastuseddate#ps

  • Size

    16B

  • MD5

    857d2c6ee6c0b7bb563a132b61a40cd6

  • SHA1

    d8f8b446b3310f3f34c8bd8a85155aa07714d2a2

  • SHA256

    600acdcdbec2ab4fad005292ec417ba0b23d81493e6e012cd589a87fa7eac572

  • SHA512

    3a51142078ca897050a89a6ac47d508b4a9121af0dfe496943f3cdf67b0d6b6bb83ea6a27bb45eab996da1fa8f1f397edda4f6a67220e07b69bb1fc74ab6a55f

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Bartender 5 5.0.27\.background\bg.png_com.apple.lastuseddate#ps"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Bartender 5 5.0.27\.background\bg.png_com.apple.lastuseddate#ps
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Bartender 5 5.0.27\.background\bg.png_com.apple.lastuseddate#ps"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f71fea98697f6ffc98a7d60c2c36fac7

    SHA1

    861587bdd8f2dd26418c51d1482f580c153f0384

    SHA256

    db3e5f57a117417bb4ac5a69fe7bd241778b1fc55501b275606c527988fddffd

    SHA512

    b2ea111aff0db6d3651b6588e7c72a0d6d813daaf73b354d0c749b57e3705342ee56c5fec2b52d5600e7fa5688713da608469a0d2a0a804a3b6f9530dfdbe7f5