Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 03:11

General

  • Target

    celery-api-0.1/setup.py

  • Size

    770B

  • MD5

    78789cb2b91454ab42920a6e74a7788f

  • SHA1

    a5e09177c8db40763f0a2b1ed392fff9d38a5483

  • SHA256

    ae086298d9539d964beff2eed553ed9177205e278f034d79013bf05b81fcc408

  • SHA512

    a597266ff909ade16e6442f7479328d054337e21ebc10924c19a5ce40669733e4488337f661710fe5b0b0883cfd30f420bb8a40904fc8e70e74a9fed20492a9e

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\celery-api-0.1\setup.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\celery-api-0.1\setup.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\celery-api-0.1\setup.py"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2688
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    eae278630ac747f70ecaf453253bae47

    SHA1

    82e149568bd2cd5c9faf9e240b29045cd999f983

    SHA256

    f1c9b4bbdfb5382e126675b2a138bfa216de2e6eb07454ec22991a1b7e22bbab

    SHA512

    4a2deee05149994765d6e1173f34b32c24d16d35b651a72f531003f1e089276540db4f78cda107c3bda90805e2d8799682ecc2af327a3809863f31de9df2be52

  • memory/2688-41-0x00000000051B0000-0x00000000051B2000-memory.dmp

    Filesize

    8KB