Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/10/2024, 07:22

241006-h67vesvfkn 3

Analysis

  • max time kernel
    240s
  • max time network
    244s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 07:22

General

  • Target

    png-challenge-debug.exe

  • Size

    466KB

  • MD5

    c90367700d9d6d2a89dffcab6266992e

  • SHA1

    dd49fc53e78ca06bc48abc0c439b37bde3eb36bb

  • SHA256

    3689c56f101d93cebf65f58b60c87546e135d42d6f211250bf057052f965a572

  • SHA512

    6401ac3c5ca66ef4f80e841614ba86985fa33154a7e1ce3f7c661dba1161f1a5627bb5fd63b1c18e207c4fc800f5f4622f5deb7581314da97525fb51908774b3

  • SSDEEP

    6144:ktBAvx47xc7wUxehA3xO+wIjsjieMEI6glW5cVFZBhdM/SrQDupJpRCzR0lSLgi:Yq+hoiIjseeM45Yhm/SrJp3RCilggi

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 52 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\png-challenge-debug.exe
    "C:\Users\Admin\AppData\Local\Temp\png-challenge-debug.exe"
    1⤵
      PID:2376
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2292
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0xc4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2768
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\AddSubmit.3gpp"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2756
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        1⤵
          PID:1028
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2412

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2412-21-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2412-22-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2412-23-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2412-24-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2756-18-0x000007FEFB0D0000-0x000007FEFB104000-memory.dmp

          Filesize

          208KB

        • memory/2756-17-0x000000013F830000-0x000000013F928000-memory.dmp

          Filesize

          992KB

        • memory/2756-19-0x000007FEF59B0000-0x000007FEF5C66000-memory.dmp

          Filesize

          2.7MB

        • memory/2756-20-0x000007FEF45C0000-0x000007FEF5670000-memory.dmp

          Filesize

          16.7MB