Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/07/2024, 23:19

General

  • Target

    auto-py-to-exe-2.44.1/README.md

  • Size

    14KB

  • MD5

    295ec84c24d3a3cd087e7e6e05d171b4

  • SHA1

    90851b64cf6a563f8d647879e7675187015c4714

  • SHA256

    7605dcbb013efff23b1e65694412965cbf28ce9dc60334b1215314bfb049b4a9

  • SHA512

    63cc1deb3b139133e190f9b8dca6577329fde838e233787a199f4e3ae156b3e03ba535726a0cee728b8eb869e84bb82095f81ab7bcaf7883b15cd85177091c8e

  • SSDEEP

    192:cK+52lq4/cu7Wl+XUmi0jUftKMb8UjwwpA3N07P8pTC9SBbMWYm77q:cK+52ll7bXbUlCpWCMc77q

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\auto-py-to-exe-2.44.1\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\auto-py-to-exe-2.44.1\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\auto-py-to-exe-2.44.1\README.md"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7857d2df8764b39e82ab267a39d9ce2f

    SHA1

    3d5ee1de51584f172f067f956b4da3192f73b120

    SHA256

    5930a86be9e916c2df582ca3d36e06b682f0fe6c20c8a6e51aac2d4911664cfa

    SHA512

    ef6871a20cccdfd89923cf219df3781e926b85bd97777a2e39a37110b18084c8ebdd858ef57bb81f35959e12dac2124b96c5cde633d8f27d82b20795159b0a57