Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 20:38

General

  • Target

    Start.pyc

  • Size

    1KB

  • MD5

    c39d4cc566999e60a297c8f6d0b83da5

  • SHA1

    4d84ecb5d59c49735b75ef18c9aa6f6df56d3532

  • SHA256

    805ea120cbd0b5e17e7b91abb2b5e9f0671a0c1d83443a58cb2cee02e7ecf3a6

  • SHA512

    d4ac0ad4ab47d697633bdca0a352aedfdbbb8dcbb066958a7aaba0c39def4c1ff4dafb4bf4a633694058128d03b4dac312d464c5f1a4916d75ffe64db3028be1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Start.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Start.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Start.pyc"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e82eb2a6678b81357f49a63c963ecfef

    SHA1

    005c1e5885cd873e5d5dbddae2b920e2aa23eee0

    SHA256

    c6d39674334e8ed08360ffb50e4ca3d0f49074956c898f2240c824d2c67d1ccb

    SHA512

    68ef0b7f8343ad833f427b8e36493ff46b33eab5de46d33e583c60105d18932ef34b27e185c01ec8ff56f473da6079e486940ed2ae7ec5c2560040f4fd3ecf7e