Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2025, 08:25 UTC

General

  • Target

    translations/qtbase_fr.qm

  • Size

    155KB

  • MD5

    aa1140597635ff68d264f274c0f38b87

  • SHA1

    170839a937a77c588614fdf31063c165ddc16b86

  • SHA256

    314243a55c32679ad473fdfe48dc7d66e973ad0fc8bf2164480c58dddb50c1a7

  • SHA512

    9be7efa11fcc0c27009b4db08483141ac0d35e10e844550416c090ba863995107b60f4f8b0166fbd5932e4c02eebb67981d64564085143ceb5ba80dab275f3d1

  • SSDEEP

    1536:YqXh2acowfpfcvgCZwmGPIDeirKTrig+sj7irWa:YsYacowxfc4KwmbC1CJGgWa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\translations\qtbase_fr.qm
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\translations\qtbase_fr.qm
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\translations\qtbase_fr.qm"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7d89fa3fd10785f02c2b76d937b1675f

    SHA1

    17e0f593a9e15040d595f9e74c8fd8c6a39d3a9f

    SHA256

    7661efc8dcc5eb962b0e72fb9aee9c3108d4238f834733fa2335da2d4f09d4d9

    SHA512

    ae8528ac705e24eedd68a25b5f318ec6974d053199311b959d1ea492e9e6aae5a0e34d333ab58f4a6663fb00e376df87080c2fda1ca3948843190d90f00b0ed3

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.