Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    171s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/07/2023, 12:59

General

  • Target

    Among Us v2022.12.14i-Pivigames.blog/Among Us_Data/ScriptingAssemblies.json

  • Size

    4KB

  • MD5

    1dd141055c1c2d70fd7e364dda78ee58

  • SHA1

    9c819adaaf6464fc43cbec732a6a13cac8d4203b

  • SHA256

    2d0f05fc1f51460ddeb80d51449cecf74d40aa24bf59a9439fa939f21580254f

  • SHA512

    b4769c5affcba00a8b0ffaee933d9ba694277534ea88b0e806f3b767c346bed0773976f6e3423de84fb40fe064c76376bd8f4535df07131bad7ebd43a18dabf8

  • SSDEEP

    48:YXNAYrwXrj3R/ClouezwVSQGoSfTG/fjR6+05DYgCI68W44g33W:Gmjh/Mouezw7jo68OgHW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Among Us v2022.12.14i-Pivigames.blog\Among Us_Data\ScriptingAssemblies.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Among Us v2022.12.14i-Pivigames.blog\Among Us_Data\ScriptingAssemblies.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Among Us v2022.12.14i-Pivigames.blog\Among Us_Data\ScriptingAssemblies.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    46a99388fe70e730e723d5bfd37524fe

    SHA1

    52e35107084afbb2829034e8b009d93f8a622e7d

    SHA256

    dc4f91424ab8deeabf16a88bd4bcca70ba10e3ec0d493a9aa61bb703b34c4928

    SHA512

    a2a430b4b4c347576fe2c23add7b77a3def6a0fdcd26773395f7b7f73bd9338ad2ebc057fa55419c3ef08ed6453e8fc920ff65add96f84e3e7e1471d655a1f61