Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
ACT_OF-19.rar
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ACT_OF-19.rar
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
ACT_OF-19.rar
-
Size
10.1MB
-
MD5
470b6df4653256e75119c058c9b320e2
-
SHA1
9cf5ab9bf9c5d1891b90a1e3fab77b86a39af55f
-
SHA256
dd9ad31bc03842e1c870a24d7ab9080659a53044a984676fbb8a7e8f81516478
-
SHA512
96f45fd42c58fc7db887f17412a9d6f74ec32b186ba94e3c5ad195c0aa05faa2fce58dd28a98786d3def382b05558d80f3bd8462d5ced03accef6b316c75a966
-
SSDEEP
3::
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2604 2684 cmd.exe 31 PID 2684 wrote to memory of 2604 2684 cmd.exe 31 PID 2684 wrote to memory of 2604 2684 cmd.exe 31 PID 2604 wrote to memory of 2688 2604 rundll32.exe 32 PID 2604 wrote to memory of 2688 2604 rundll32.exe 32 PID 2604 wrote to memory of 2688 2604 rundll32.exe 32 PID 2688 wrote to memory of 3040 2688 rundll32.exe 33 PID 2688 wrote to memory of 3040 2688 rundll32.exe 33 PID 2688 wrote to memory of 3040 2688 rundll32.exe 33 PID 3040 wrote to memory of 1264 3040 rundll32.exe 34 PID 3040 wrote to memory of 1264 3040 rundll32.exe 34 PID 3040 wrote to memory of 1264 3040 rundll32.exe 34 PID 1264 wrote to memory of 2420 1264 rundll32.exe 36 PID 1264 wrote to memory of 2420 1264 rundll32.exe 36 PID 1264 wrote to memory of 2420 1264 rundll32.exe 36 PID 2420 wrote to memory of 1280 2420 rundll32.exe 37 PID 2420 wrote to memory of 1280 2420 rundll32.exe 37 PID 2420 wrote to memory of 1280 2420 rundll32.exe 37 PID 1280 wrote to memory of 2336 1280 rundll32.exe 38 PID 1280 wrote to memory of 2336 1280 rundll32.exe 38 PID 1280 wrote to memory of 2336 1280 rundll32.exe 38 PID 2336 wrote to memory of 2644 2336 rundll32.exe 39 PID 2336 wrote to memory of 2644 2336 rundll32.exe 39 PID 2336 wrote to memory of 2644 2336 rundll32.exe 39 PID 2644 wrote to memory of 3032 2644 rundll32.exe 40 PID 2644 wrote to memory of 3032 2644 rundll32.exe 40 PID 2644 wrote to memory of 3032 2644 rundll32.exe 40 PID 3032 wrote to memory of 584 3032 rundll32.exe 41 PID 3032 wrote to memory of 584 3032 rundll32.exe 41 PID 3032 wrote to memory of 584 3032 rundll32.exe 41
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar6⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar7⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar8⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar9⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar10⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar11⤵
- Modifies registry class
PID:584
-
-
-
-
-
-
-
-
-
-