Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 15:15

General

  • Target

    main.py

  • Size

    327B

  • MD5

    b6b6330ba6f52dd8912d22f4f5dc3301

  • SHA1

    73d25c441dabca13363fe4b822903a39ac4e932a

  • SHA256

    2d298883b46095a1a78a59b672b87050e017ce449946adb3bb47c54a332ebbee

  • SHA512

    822c4063fc4eacb5322514cf55129562cdf48f8ffe3aee662eaed4661d448cf13b4e5bfa932f456c462b7b80e46a462f9c7f5169e19d6f38f7add7330b716b90

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\main.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    58b24b16cb3b790605c69ee7b38c4d29

    SHA1

    134248635ae416cd711f6f5e0824b915d6b718b5

    SHA256

    5a9df530509139ca7d01085fe43815914759190c62ba6111a19e40ac7e211368

    SHA512

    a8e8d449356f040ca37d89ffc270b15b2366e1a1b02ac44b4652829df1450ff901f39975c83dccf56880f50e4d0776020831abd6dc6aa00336b792ebafb42bbe