Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 15:16

General

  • Target

    dheater-0.4.3/.coveragerc

  • Size

    171B

  • MD5

    ec9da99c3924deb4968c87e114ddef4d

  • SHA1

    954812d1afe235288cba96bf1244b917392e42db

  • SHA256

    0456401b4d2e8fdbdbaa1154ee737fe78b96451cf787e57c2fd4743b3d667632

  • SHA512

    bcdda446dcb572501902c7b133b70063acc82edf2f756534236dac2f1d2810755ac37ef30395acdccbe31025a4fbe30dbb89c2f5b8833bb6c68a694a16995ee2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\dheater-0.4.3\.coveragerc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\dheater-0.4.3\.coveragerc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\dheater-0.4.3\.coveragerc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2c751793aba9c8e483a050c19757db21

    SHA1

    7e6c1e36bf0bae376f99e3910cf39a112f55e21f

    SHA256

    5eef1f891b9ea21c16a77611b051ad3dc54748f2c6b8f3092d6f11ba217ea6c7

    SHA512

    0c879c950cab1fd22a176406a60a7b72f237b610c55a6d3c1b5298ef35eff9593af30c0779e0547646c79ebc892119947bb024fd0ed1aec60a2e1b119f455af4