Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 15:54

General

  • Target

    ACT_OF-19.rar

  • Size

    10.1MB

  • MD5

    470b6df4653256e75119c058c9b320e2

  • SHA1

    9cf5ab9bf9c5d1891b90a1e3fab77b86a39af55f

  • SHA256

    dd9ad31bc03842e1c870a24d7ab9080659a53044a984676fbb8a7e8f81516478

  • SHA512

    96f45fd42c58fc7db887f17412a9d6f74ec32b186ba94e3c5ad195c0aa05faa2fce58dd28a98786d3def382b05558d80f3bd8462d5ced03accef6b316c75a966

  • SSDEEP

    3::

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
          4⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
            5⤵
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1264
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
              6⤵
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2420
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
                7⤵
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1280
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
                  8⤵
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2336
                  • C:\Windows\system32\rundll32.exe
                    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
                    9⤵
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2644
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
                      10⤵
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3032
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACT_OF-19.rar
                        11⤵
                        • Modifies registry class
                        PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads