Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/02/2024, 22:08

240211-12e8qaca3t 10

11/02/2024, 22:01

240211-1xpxcsbh9s 10

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2024, 22:01

General

  • Target

    empyrean-main/.vscode/settings.json

  • Size

    53B

  • MD5

    76a322b0ed73c31e6c0aa1babb1af1c5

  • SHA1

    de4fcc00897666aee8f6ed2797dc83b870bfaa48

  • SHA256

    d3c9cdfd35e43a33fec6a7ff05ac8aaa9bdbbc062fe3a79598781f408fee7308

  • SHA512

    47e1c1270fd3f84d558b002bbf946a1cce3b3f13eb95216e3e052ff4090c59b149148f4e128aee40348db3fc528db923111e4d4afcf1baae5fd577d24a8b89eb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\empyrean-main\.vscode\settings.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\empyrean-main\.vscode\settings.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\empyrean-main\.vscode\settings.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4cb9c190e9d569f2317cbf0c397576ab

    SHA1

    a60d157872147b47f2df03f4b3b475a154526db8

    SHA256

    e24b4e2b621ff60caa26211cd624fa21bd698e334f9a69e361f74cc40a398cd9

    SHA512

    bd4da9c2caec6fa7973bad0f1f41c183bbadaf722cc640dd3cc746b95c69c4fd29cc06b36b700dcf2207af604917635b4f764570720d3529a4b3e45d87d4d4f7