Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 14:23

General

  • Target

    V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.deps.json

  • Size

    61KB

  • MD5

    64ae126cf65a9096d5730e060b448293

  • SHA1

    621bce8056a378974cc38788bee2c3079aec7a87

  • SHA256

    a4cadd5c4f3922a4ada9e4bbc13e2bd779280a9b8cf537b66475fb3559bc7122

  • SHA512

    8eb0dd523d91555ff65681ebb2d482e86e8ee5c2a8842fbbb479d164981d3d398308d335f8c3ba813007c16bf738c7ae72e4eb3c9d3ec92f4f09312e09261dc2

  • SSDEEP

    1536:9+lcu7Ll5JBuR6ML1O/1u33ZHZsSGKm6Y8:8lcu7Ll5JBuR6ML1O/1u33ZHZsSGKG8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\V1.5.6 + V1.5.8\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.deps.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\V1.5.6 + V1.5.8\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.deps.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\V1.5.6 + V1.5.8\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.deps.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    6ed6f4c9ae6dd0129772b46c4d4b4c0a

    SHA1

    9566fbb5dacd5c22771a0f09edfd8b0162928562

    SHA256

    1b2fd5a07eae56d7f32977a7ce3a5dbb5a1235cf683066773207f09f55d576fa

    SHA512

    15f985a7c8865914239a607a529e97a9012946b76d709383de50eba15a1176737708af92c493e083161ccbc890d2309a0cb699b708a82d95af168d29ccd7cdf0