Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
python-mongo-0.2.0.tar.gz
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
python-mongo-0.2.0.tar.gz
Resource
win10v2004-20231215-en
General
-
Target
python-mongo-0.2.0.tar.gz
-
Size
130KB
-
MD5
479febe63ba03512c1d1461d2b31c552
-
SHA1
42c6a7635f97408c9cded83ff89306f1463d0ded
-
SHA256
1df1ceb30c094d5a2140093e1d677e3550c1834af3ae0936a9745f6bec3325be
-
SHA512
e64fc8b916074129015b4e2fcf876967ef59cac686dc4e8895f243b1b258646b663f9d10fdfebfa8c80599da5716564b27c592390916632114de83c7c83f64d6
-
SSDEEP
3072:pIfpNI2MBr1cvF5w0BOjS+rzkpqkPMstnZ3M4ABGOQdvaL9U1fvPrZtzo1DuqJq+:vDuqJffLNVSgE29xxspm0niivuz3+96F
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2672 7zFM.exe Token: 35 2672 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2672 1040 cmd.exe 26 PID 1040 wrote to memory of 2672 1040 cmd.exe 26 PID 1040 wrote to memory of 2672 1040 cmd.exe 26
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\python-mongo-0.2.0.tar.gz1⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\python-mongo-0.2.0.tar.gz"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2672
-