Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/12/2024, 15:13
241211-sl1wgsxphs 310/12/2024, 18:36
241210-w8wrtstkev 310/12/2024, 17:54
241210-wgzdms1rdx 10Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
241209-wte6jawnb1-behavioral1.pcap
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
241209-wte6jawnb1-behavioral1.pcap
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
241209-wte6jawnb1-behavioral1.pcap
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
241209-wte6jawnb1-behavioral1.pcap
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
241209-wte6jawnb1-behavioral1.pcap
Resource
android-x64-arm64-20240624-en
General
-
Target
241209-wte6jawnb1-behavioral1.pcap
-
Size
21.0MB
-
MD5
71ec93443f4d7d8bf391a5b02856c246
-
SHA1
d4847d5a2bd26173da036f0d8a7b851c7e7d128b
-
SHA256
2e5d63057adec0e8d39f369d77f010b03efb0bf16b90cdd05676e346a930d7b6
-
SHA512
3966071c8ab7e0d2e57738814fc7d9da2db0d5ac0e1a7a7d58a55d07419d8d555d4f34c631e8713919d8bbdda632848a5bcf87a16ecaab249c8b38b3d43c505b
-
SSDEEP
393216:cQCU8iszVrdcwEyaqGl0NziHnzXzKuhmdZ8Sk5HQnCxqD:EU8imJdcbZsiHnzjKuhOZOtGtD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2888 AcroRd32.exe 2888 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2172 2624 cmd.exe 31 PID 2624 wrote to memory of 2172 2624 cmd.exe 31 PID 2624 wrote to memory of 2172 2624 cmd.exe 31 PID 2172 wrote to memory of 2888 2172 rundll32.exe 32 PID 2172 wrote to memory of 2888 2172 rundll32.exe 32 PID 2172 wrote to memory of 2888 2172 rundll32.exe 32 PID 2172 wrote to memory of 2888 2172 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\241209-wte6jawnb1-behavioral1.pcap1⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\241209-wte6jawnb1-behavioral1.pcap2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\241209-wte6jawnb1-behavioral1.pcap"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53f7791afbfe6ebc40fc47b819f3ae6a7
SHA10068e8b6e4d9d66c7599763084eac52286a08d99
SHA256e87699b74662c60890c6e0f6b5bb7e6c54133739c25cf784f43bc66d9ddde0d4
SHA512f19759fb336f49ce6c3260f6b2f0a89250b5f759d7c827fc1e93b7a3548da1ba2c75aa08a341579742300cfd994ebe52a60a365ca81b7893841b2cc5d3d8e9ba