Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2024, 10:53

General

  • Target

    dionysus-2.0.10/bindings/python/pybind11/tools/FindEigen3.cmake

  • Size

    3KB

  • MD5

    7881fb94388ce30ace0372dc1ede81dc

  • SHA1

    1a691470ae00ba90f290d58a1bf1d2c47570115b

  • SHA256

    9624a761c330d6003123e0191954b408926c390d9b19c0dc1b72db091e6cb5af

  • SHA512

    ad5e11ac361d180c9cc98344aae81c1a13acd3f11aad860f6e6d810cf7ede5cdb7d89031d084c25eddc485ef044c3aa654684bef6683785595c2ac0b53afb9d4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\dionysus-2.0.10\bindings\python\pybind11\tools\FindEigen3.cmake
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\dionysus-2.0.10\bindings\python\pybind11\tools\FindEigen3.cmake
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\dionysus-2.0.10\bindings\python\pybind11\tools\FindEigen3.cmake"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    cf4c03a38aa386896b3ca42256129d2f

    SHA1

    196e9f000c8da756b8d2986c4a7b46cf4a498ccb

    SHA256

    bfcf1791a94b645dd821449ece43d00dfc699795855a97f644b361111805ebba

    SHA512

    40d1c47b8feb1592a7e937e84665f2806910c2070e6a005a4886aef80a1a004eed3d050d1c779bb7df500eea137a40bce7fc830c45fc5ea0067d8224be33e45f