Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 03:45 UTC

General

  • Target

    python-zeroconf-python-zeroconf-3c9b17f/bench/create_destory.py

  • Size

    555B

  • MD5

    cfe70ac2d52dba73902ad39ac2a143e7

  • SHA1

    475bc463a2d72fd2f0479adcdb3aa2978b9e902f

  • SHA256

    5425c37208a2802f72513e8f2bf485512e448c3bbfbd38346fb78b43d189e176

  • SHA512

    01bd8188d76750f484e5032243ceabd34dfbc1e1be7544a61b1f49b8f9eef3bafb5eb4ed4e8344404f6a317f56bd9bc3474c25c866b7e30249df9f212f26a6a5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\python-zeroconf-python-zeroconf-3c9b17f\bench\create_destory.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\python-zeroconf-python-zeroconf-3c9b17f\bench\create_destory.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\python-zeroconf-python-zeroconf-3c9b17f\bench\create_destory.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    df49863b3229bc569c1c5e81d20eb2a9

    SHA1

    6950035d8b4abb56a228f76ec79a9fb1e643a068

    SHA256

    dd044b268a13887763b4c2776ea98b205b2008d4ae29cd37fa84e0ee3f9c67a7

    SHA512

    b48eac9f9d4829f8872791ffd84355550d4bd70c7dd573fdc25d3a1d134c3696fc2619be4a7d250126dc5a4953e4aed86fc6018fb6041c41489b7719410dab31

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.