Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/12/2024, 23:35

General

  • Target

    _internal/i18n/search_files.sh

  • Size

    84B

  • MD5

    aedeefef2e6623a467137a9f0b58a7d5

  • SHA1

    e226df2a7ae35d20fd1e8f29c8f31f4ad66d6111

  • SHA256

    73062905687f5929fc078e8512981efd6a410a0b7bcc716917d09a293f39cb03

  • SHA512

    d40c793da09ae048aab2531e09f1352ca7e38b3804f2baf3f4052418134adcea7a3152952b0cbabc06c797a4e9905100a094fccf4c9d3e2c6259f4a942981d47

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\_internal\i18n\search_files.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\_internal\i18n\search_files.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\_internal\i18n\search_files.sh"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fcdfadbad4a6aa69beb92594bc3741c8

    SHA1

    bb5921cd148c71f7f68cbd203a3e764e9b8eec73

    SHA256

    dcbf43a17121117c5230d2efa14cda75fce6caf15a66b1fcc9940f6e6c99516f

    SHA512

    85a827c794c225724344e6445da6aebd6378bad322f45e57bfbb8278e51aca96ef35b5bd1febdfbf12e52017772774c67d88b1546aea65471eb9f0bd2e148bbe