Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 22:22

General

  • Target

    empyrean-main/builder/util/config.py

  • Size

    2KB

  • MD5

    083bc8cc27286e50c08f0f53876f48a8

  • SHA1

    2a1d0ade3e5b4abba267b9ccfeb2fee681a7f032

  • SHA256

    b5f7ff2bfd9a7fc444076ac74dc7034d9d366152f4fb288eab481597bbf54672

  • SHA512

    832bff211d5fff703c1cfe5b54777e5707c4e9703499edfdaa25865bacb7504bdfe41814033e6269537d692e0c53ee58f6c80184697564adf6969931370f50ca

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\empyrean-main\builder\util\config.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\empyrean-main\builder\util\config.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\empyrean-main\builder\util\config.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e73f5a5d3eeb1d1522e7446e1c9a347d

    SHA1

    735d6ae048a01be654e5764694e64bc5f45d8946

    SHA256

    23d73e66023e4cbe52b2c28787600f3e15b0b31ba1a6315eaf3549bf3b88e29b

    SHA512

    a6aca1bdeb2f95d76bde85f283f7c7cf5b39eb35cc982f0e5dd0a4bbc4019acfe6c3c87694a89241226e3d7da11bb47a2a599df735df581b930976d5f57ee587