Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 07:44

General

  • Target

    cinerotique_mod_scripts/display_mod_version.pyc

  • Size

    2KB

  • MD5

    6a15506fd746874c107e7042c1a1b860

  • SHA1

    da4e9ad5d6843f0b0a43540b8a126d1b7690ff1e

  • SHA256

    4bcd25559043ad65e948d76fe1dd22a16ba9bc45b5f44f493308cc29663c4301

  • SHA512

    cc98bac8b7af4aa9abb5a9713a73e88c6cb9fbe7fa8135d42ed13db8cb202a36d34aa9242a95b912bc20f4541182d6176eefc0771b48599948b812ebf1003198

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\cinerotique_mod_scripts\display_mod_version.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cinerotique_mod_scripts\display_mod_version.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cinerotique_mod_scripts\display_mod_version.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    cc83db726cc9918822dfaf6bc621d8c3

    SHA1

    b3357603bb7a5f048fe8770eceb20e1cb35ba13d

    SHA256

    9e0e3505b57b8667b5c89f26bf6f9d4d3e041a1cbeb17140be1d0eb5fba66b0a

    SHA512

    881433daf3c49ba4f6525b953a72bdfe179e73425c2a13202655edd6460ebe8f6292e333de05a467d8700dfb41c7339d2ec1dd7a1a582aee988e40579680bf30