Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 19:51

General

  • Target

    advanced-multitools/plugins/pinger.py

  • Size

    13KB

  • MD5

    55a06cf97f1a4efa8583b460db544916

  • SHA1

    1e9cfcaa4274321087c2d177530c7b64bd23e1a8

  • SHA256

    d734954923f4307c08d52c29f5d4c63bde0e8efdd529cf25d9febe7d4020fb78

  • SHA512

    d05938c50b15792924f2089ef71ca5686270b5d4428f18ecd80df0af68bf725e7bd4cfb85af4d75f004152db1ca4101289033d4e796420d043981c1a94311133

  • SSDEEP

    384:My57i5/lT4+aps1xZ+C1HTBM1b6S1o8l1j93q/iEdX/BlQF1XL1K:MSvh93q/ik

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\pinger.py
    1⤵
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\pinger.py
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\pinger.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    6a978a7467939b66198b6b0f01e96d17

    SHA1

    10255ad298c9924f0e27ee698ee9f78af52dd88b

    SHA256

    3b8943ffcf9967926c11a22630f13606f8815b5d44d07c4ae4a431eb1633f199

    SHA512

    10bd6baa10e88d59d1388e0b9a3efd978ff61868f1f4353ca65dce5759a9d398f949c4b4a7a74368dc7b9c1e9bdc21a56eaa72e638b10a54fd45e04d324dc18b