Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 03:45

General

  • Target

    python-zeroconf-python-zeroconf-3c9b17f/bench/outgoing.py

  • Size

    5KB

  • MD5

    83c07b9aff46f6fa41f8dcd11658f8b6

  • SHA1

    aac28d54597cb256c90d97d56e6435ba49d337f7

  • SHA256

    1fb7a751f63bbd147f601b71575c636c673682544fb8ef4e9324465002dc0077

  • SHA512

    ecf2d66b313dd304375d6ad9533ddae15dc1b3b2c4e8a89d2940fbe3390ff1aabe619cdbf7f29612e235675c680c282a5bd76cead0e659451a878270d15a830f

  • SSDEEP

    48:11HDvBVvbEztnCkbn7dTjM7Id9aysMD/Nck5pbUmT3mLAFxvjhKYvtJ3W0w5:1dl5Ax/5jNaeNcKbUS3mLAFxvjrg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\python-zeroconf-python-zeroconf-3c9b17f\bench\outgoing.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\python-zeroconf-python-zeroconf-3c9b17f\bench\outgoing.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\python-zeroconf-python-zeroconf-3c9b17f\bench\outgoing.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    05d365478f44ee45b7d69f30882f5e38

    SHA1

    d21ee637047c074a3ae49459021f49a549abc5e7

    SHA256

    2da1eb75da7aaad9f7195de3d445aec49e515205b7c304c92bab92e8599181d0

    SHA512

    096cc8e9a1d16241c8fbf3051f2de19b227e07a16481bd256c61b92e95bcfded7182575e28de8e9744fb574189f6c9a1bc3d9466d47dd0f0ec4688cda6205e97