Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 00:00

General

  • Target

    Paste 4.4.0 [MacKed]/.ds_store

  • Size

    8KB

  • MD5

    af9c5437f25df56d38284b2013fb4457

  • SHA1

    d4effef98846a5b68e17a6bacf916f6ac50c27e8

  • SHA256

    22aa6dce9da8da2531ddc2537973f423a449d5b880d2b83efd21917c15715f77

  • SHA512

    6226beba496ec0be49c588a076897c9f01fdd0f116c8ea68d3450ae3046a632323412f21140c067f5fb73e914acc465677caa3060e8e9120ed0810712cd24872

  • SSDEEP

    24:DCMVZFHxhLmjz1A7/T7bkcl7aZW7Xc3l7gw5spmlAaZDd5GQZqc2aCEXfLTxZLe:D5hqjzAHIUGKXo5//j9dYpcRCEXfLW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Paste 4.4.0 [MacKed]\.ds_store"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Paste 4.4.0 [MacKed]\.ds_store
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Paste 4.4.0 [MacKed]\.ds_store"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    039281c4a89a8f3962ed68cdc8907b00

    SHA1

    82837432e0edfa020e13dca0acac6783296e215b

    SHA256

    8333b3ee61288566ba1d71ef160a7019f94e06d89a1f6272ab9ec7a16d4cdcf2

    SHA512

    dfdbcd2d39b38f8cbe6ad08af8fac86eeaed8368b69cf79481f9ead2026b987d8bba744529b81e3d6aa752ed2957e1d86d87e266b7dca71f87e3057121854f21