Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/08/2024, 05:47

240814-ggy1jsxfkf 10

14/08/2024, 05:40

240814-gc194ssdjn 6

Analysis

  • max time kernel
    1563s
  • max time network
    1568s
  • platform
    windows7_x64
  • resource
    win7-20240704-ja
  • resource tags

    arch:x64arch:x86image:win7-20240704-jalocale:ja-jpos:windows7-x64systemwindows
  • submitted
    14/08/2024, 05:47

General

  • Target

    CyberDEV Client/lib/selenium/webdriver/remote/switch_to.pyc

  • Size

    6KB

  • MD5

    a4f7f1c03bd23323e9cdbbea8fe2f5a7

  • SHA1

    a7155b2fc34773b580f8078e9bdee6f0eaef79d2

  • SHA256

    55056bbe51592d0bee90042dad783e6fdf6f97cbf577530d625cc5db9dcc18ac

  • SHA512

    70150fd0f85d7fbf4860be8720b50db49eee80460d7a15648720fe23f7473c2990054bef3a772dd156b7f54be309d384c558db48e304267328d1dd026da37c23

  • SSDEEP

    96:3T7isYn4mI+5QvCokxPXKvj5ywAjup1zPewd5zwKky:j7W4BwQvwXGAjuLj7iy

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\switch_to.pyc"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\switch_to.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\switch_to.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3922c4b3571c1ae89b6a55e6b2d40c5e

    SHA1

    8248452f676548806f3146425c57f7773439d041

    SHA256

    51e73aaa5d2e88702527e83306617bf46d602ec1dd7885329173a6058b0d9de0

    SHA512

    5360d3cb67e96681a9d43c82a8aff857897e6cc0cf61d602b2640eb3f15ee4e014c53e9cd78cedce158769a6de17fc9cd102fd5abdf899aa0e02ee6b49e0e0be