Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/08/2024, 05:47

240814-ggy1jsxfkf 10

14/08/2024, 05:40

240814-gc194ssdjn 6

Analysis

  • max time kernel
    1212s
  • max time network
    1217s
  • platform
    windows7_x64
  • resource
    win7-20240729-ja
  • resource tags

    arch:x64arch:x86image:win7-20240729-jalocale:ja-jpos:windows7-x64systemwindows
  • submitted
    14/08/2024, 05:47

General

  • Target

    CyberDEV Client/lib/selenium/webdriver/remote/remote_connection.pyc

  • Size

    22KB

  • MD5

    3e3051750eb79c9e0bb75f225c33cb62

  • SHA1

    3fc51d54a357e9b51c6ac2ad2d14145499037a84

  • SHA256

    dbe6a4386ba87833f2076f6dc6122d5073defd42681d18ee931219a6bfef92a0

  • SHA512

    95b780ad8e628f975a0c33fb492f70fea4ea319d603f9c84ecc5d10daf3f7268f6eea7e743f378cdd7b548a3be1177e421e2b576b967cc51a73abfb08b1d9629

  • SSDEEP

    384:eRfgZgleqsU1W2frvujwA9AOZASmWn2boukdjAoFVxDjNB4ypF:3qleqsUVjOT3BmljKcDypF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\remote_connection.pyc"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\remote_connection.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\remote_connection.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a669fa3bed0ac4be7b6af31336397939

    SHA1

    1a4da8c9be9c6167ad1727bcb673be090d648dcf

    SHA256

    79a4cbe1105b52f73af58a84d1580e910e36e4a1262d2595f4b0d930450c7491

    SHA512

    d2ca3732297ce842bb7206ad6fe6ccb23e12d4de7322f8fa755ba4961ffd9b1460a183c9e9ca780fd7224f9f6f73521dde05cee4024fa8ce8f7e7d83c0f3bb42