Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 12:56

General

  • Target

    Kematian-main/panel/ui/modules/builder/main.py

  • Size

    4KB

  • MD5

    61611682dab66555410921dafc857279

  • SHA1

    a756d1e4f767d0e84b21ebf4a036b4520f309473

  • SHA256

    8991b5a3688428af7c8cf783c2af67d7a0e986ff5fb2244a0c07184c325dbf3f

  • SHA512

    0aafbb492f1434cf294ef9f300c47e24870868e74441236bd3a1637cd0195efd46125931ece937b33699e031f5a84444840a16d9584d83d78d737f72f08fe31a

  • SSDEEP

    48:C/FFRiVBDdC/S+cXwTXT4sTfTUTqTHTwULW7T2wXoT63FYYZWGEDkKlQ3wXgYD:C/F7ABwLcFBjFYYUDkKLwYD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Kematian-main\panel\ui\modules\builder\main.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Kematian-main\panel\ui\modules\builder\main.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Kematian-main\panel\ui\modules\builder\main.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    be253e595fae4545077f0d1d6e4d329f

    SHA1

    970c35dbabcab133c547518ec29ac5c8c51d8ead

    SHA256

    1626adc2a19991858cebdaeb15d3fe12372f69e2ac6aaeb0e76caf95182300bc

    SHA512

    56bd18001bbdd80fd5e44637031cd6df05be46593123fd202c8d3babe9b511b500cc59ed90c36253db702164c96817ac326b1b5d87010a219a0e60dd2e5eefd9