Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 04:28

General

  • Target

    Linear/lib/PIL/IcoImagePlugin.pyc

  • Size

    14KB

  • MD5

    7c728e61db1db57b98a33e0fa8d36974

  • SHA1

    077a4dc758cf859fd9c5453c51037f93f34cb92f

  • SHA256

    8fc30aa1c4ebeb61c7054c822feefb6efa86a0171cadf1d6193d658c0225e8de

  • SHA512

    b9d9227782492cf37f6e07c18b3c41f0c20fcf07595a3ae67115bd199339dbe85cb9b0f7d9ebded4044aeb23a637cbc343fd4e9546ea73e7e83cac1136d7a7bd

  • SSDEEP

    384:7dNtOxjD2CrnRTnXa1UWf5K07On0NQeKrp:7dNteBbRnXa1U05W0Ngrp

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Linear\lib\PIL\IcoImagePlugin.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Linear\lib\PIL\IcoImagePlugin.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Linear\lib\PIL\IcoImagePlugin.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7b21ea3f6f12ef49fd5251dd53368106

    SHA1

    0c34fd5344ac041c5f49a8d442d85ac9bebc3e2a

    SHA256

    7eaa98c950b701769248bb28ba1dcc55b83c66ab39d200544dbbdb82955c579c

    SHA512

    fc056f0591f87ab470ef316bbc7923e2447d4b519b97e865d1fe3423acc59724d66cffff5647979538d871c015dd3e18f3a3da1365e953b362465860cb51d0fb