Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 19:56

General

  • Target

    advanced-multitools/plugins/pinger.py

  • Size

    13KB

  • MD5

    55a06cf97f1a4efa8583b460db544916

  • SHA1

    1e9cfcaa4274321087c2d177530c7b64bd23e1a8

  • SHA256

    d734954923f4307c08d52c29f5d4c63bde0e8efdd529cf25d9febe7d4020fb78

  • SHA512

    d05938c50b15792924f2089ef71ca5686270b5d4428f18ecd80df0af68bf725e7bd4cfb85af4d75f004152db1ca4101289033d4e796420d043981c1a94311133

  • SSDEEP

    384:My57i5/lT4+aps1xZ+C1HTBM1b6S1o8l1j93q/iEdX/BlQF1XL1K:MSvh93q/ik

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\pinger.py
    1⤵
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\pinger.py
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\pinger.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0239d218575ddc96e36b5331dc60a2fe

    SHA1

    f30425077513d1864e07f81e09fc71aff6b9d4c7

    SHA256

    005a02a4888c0633fada6f91c26bd81ad91466ca18d8210bc20523cc74657257

    SHA512

    e011e4c0a759f24b6736cacda23014342041537dbf1392088508d379162ec6deb302360ce493547265d1c483eb35c331f04fdb001446e121e4a704b40e4bb2ee