Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 23:55

General

  • Target

    融合版迷雾2.1.3版本/PlantsVsZombiesRH_Data/boot.config

  • Size

    130B

  • MD5

    e16d36cd0f87fc90b49a832459bc96bd

  • SHA1

    0f3cc07b61b590862fd1d5db7b104bc26da6b6d5

  • SHA256

    6afae555afdb6246b5b717b06221dd3cd259dbfc2a59752e2365654a440c7f62

  • SHA512

    7e2e060bc7fbd390dceb54cc235e076cb9ad0654cfd24ecc6d5a9473a7d4924ce4477c23a0df937299575866fc792bd65328a110e7eeeb9e777c15e6ebb49362

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\融合版迷雾2.1.3版本\PlantsVsZombiesRH_Data\boot.config
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\融合版迷雾2.1.3版本\PlantsVsZombiesRH_Data\boot.config"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    aad3fb0f9fd560b904774aeb45fe36f1

    SHA1

    1447a4cc7a4f313850af5e5b06802cc7c144beb4

    SHA256

    55767707e02ca8098b9e19fbc177afaef943102ecc8ed75ae235a9206eab8d18

    SHA512

    38c181ddb8c33573736f8bd08b73d7b170b49c16c2ee2bcc6683993a81cd27a5fd5975c8bca3014cff837112e0653a38bbca6735be5ef69821d5c8d0c5a9ea0a