Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/11/2024, 03:23 UTC

241107-dxvraavdnj 3

07/11/2024, 03:22 UTC

241107-dwyrjsvarc 3

26/09/2024, 15:21 UTC

240926-srkfpatgqp 10

Analysis

  • max time kernel
    63s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 03:22 UTC

General

  • Target

    AHA.png

  • Size

    463KB

  • MD5

    e453d2a309bddf4d823eb17f6022a0f1

  • SHA1

    136fabdc8a2192708c63da84b0876c2736975435

  • SHA256

    f47933f20a1a427349f57fdb839b9085d006ef91bb635b55447ff2d3f6c4fcfd

  • SHA512

    3108e807f532251603d8bc585d94d91e3d778b4b3945bc127aa441091e4945242bb70cc782fd01b1f1b65812c16531164dbb4dafcfbd41c8b6afc6c90b0ced7e

  • SSDEEP

    12288:QlBbFqavzhwL4YciIPARZF0EzJkQyn9a1g/DhxdF+ZJ+ROeWEF:aBb77hLYG4hkxa1gbhPCJSO3Q

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\AHA.png
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2068-0-0x0000000001D80000-0x0000000001D81000-memory.dmp

    Filesize

    4KB

  • memory/2068-1-0x0000000001D80000-0x0000000001D81000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.