Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 18:41

General

  • Target

    UpdatedIncognito-main/UpdatedIncognito-main/cert/bridge/bridge.py

  • Size

    10KB

  • MD5

    19dc0d370292feabc9fe8336d7ba1305

  • SHA1

    ba389f767f18cb29d532bdd14f5670200bcf8ca7

  • SHA256

    18f3a17fe214f96ff65338b9471d725ac151c494b457b9714127dc922ee5aaa1

  • SHA512

    d663acdbb785c9dc2e735d9d6285a117a0745e112d86bf6c87a1958c3afc3d5ab600ce641153b97c3cc165d168ee35f39f8f15e66aa7e9342020cdf138c48ae5

  • SSDEEP

    192:eSMnGDGBcWNOahThpkr5yE1gMXJnRejy1HiSk7RE+3irKAIMqwr/oKa:eS05Bn/hThqYpmRejwCRfgKAIeoKa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\UpdatedIncognito-main\UpdatedIncognito-main\cert\bridge\bridge.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\UpdatedIncognito-main\UpdatedIncognito-main\cert\bridge\bridge.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\UpdatedIncognito-main\UpdatedIncognito-main\cert\bridge\bridge.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    52b9fa697e27591de8eec28a18c098e7

    SHA1

    0496d724d1fe83e79124b72ee0244c9dbdf14a3e

    SHA256

    b4f33e9dc12be6e587ebf5307065d7165edfab1d1eae75c07665b6e7a854a658

    SHA512

    0b13e23c18908669cf97b4e52f5c4b645a0c97f485bc540a89053798682b7034d870d5ff85783e96e04385d0214cb72fa41bf3ba303f86ccfe3c33936e136d2e