Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 12:21

General

  • Target

    bin/models/PhantomForces_Hamsta_v1.onnx

  • Size

    11.7MB

  • MD5

    50a0d0e8bed0f084ee46a154df442be1

  • SHA1

    6de46f518bfc1e512797287e9d1bf4d2cdfe0497

  • SHA256

    b25e0c6dbe87475837bb0f85a40cc7ab98ea40cd0b7486f53f3fede6ff405238

  • SHA512

    63be031e8949857c96a1fc396d4d471c9b5090e9051b3a724248f0c7725c7fb2f1988116f1b298548d28b2a5458de6eeb1300efbd4dc23521a7af4d46dc4ec8f

  • SSDEEP

    196608:3aqBE21+hlJP3/0l3/zKY4BMbvCb1hAeF5qT74midcpxnDx95isYIgp/7M7ItWoy:33b1qT/0F4BZfhad/JE1cUWQcmF5fmB1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\bin\models\PhantomForces_Hamsta_v1.onnx
    1⤵
    • Modifies registry class
    PID:4732
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads