Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 18:41

General

  • Target

    UpdatedIncognito-main/UpdatedIncognito-main/cert/bridge/__pycache__/bridge.cpython-312.pyc

  • Size

    13KB

  • MD5

    afb1f91e9ff17a69ece03c9380456358

  • SHA1

    c1344657a35d9971005b4f5c39c24a29a03d40a4

  • SHA256

    cdfc4529ae6c1a6f93d006a08793ac8acc578ea5fbdc8515821a0c50f23c77d1

  • SHA512

    bdf1cae573bea990b702d1cabf5789f39b787e17a2061534ae0ee54f8d26c72acf222d385973a94b4c7af6450715b20d36c134346b355ce09726f507cf9b014d

  • SSDEEP

    384:yT27w0u8RKEriJoBLEvmrApUgvYKFDY1WLcnpVjOG:yTMXxRKEreCEvgAp7vYkDY12cn7h

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\UpdatedIncognito-main\UpdatedIncognito-main\cert\bridge\__pycache__\bridge.cpython-312.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\UpdatedIncognito-main\UpdatedIncognito-main\cert\bridge\__pycache__\bridge.cpython-312.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\UpdatedIncognito-main\UpdatedIncognito-main\cert\bridge\__pycache__\bridge.cpython-312.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0fb5aa0bed42f1146b64fb732b1ad142

    SHA1

    b75e91acf61ba486e7e9b333a7b8d7b7b6f016a5

    SHA256

    0c8e2c42b6ad6677cad8c3109f3ad0018c02c5700cf97eb5b3cb1365d57d9652

    SHA512

    52c243022e09c051015b20de71e6754fb72879a4576a3df3ea3be0997bc93fc4e55c2d26e1ffcba16775a0d7153159ee0506641e8103985c3952da4ff2cef454