Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2024, 09:02

General

  • Target

    vanish-flooder-main/main.py

  • Size

    2KB

  • MD5

    94311eeedf020257246e647d3bed46bb

  • SHA1

    1d0f06de56d007c156f095cc32e45f85c85c394e

  • SHA256

    404eecc05911e56be9c965a0a90caedbb67b73215563931bca290854f51c5039

  • SHA512

    86e0046827ca99a21e90cb47a8a929b966e9074753c3b4760a0cf26c9be894d102cf8191aa4d4eaf22a39b04ae943a3c52524ae24c3978fad347eff0d63172a6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\vanish-flooder-main\main.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\vanish-flooder-main\main.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\vanish-flooder-main\main.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    35ff91022f22f3762c8da44d17a2e1ff

    SHA1

    fb0f768a53c56d6712c332b7290f9d10a62e922d

    SHA256

    a4b8daf6fae914aafe3ca319a105fb449e0a95d76007672f7e6a65e6e2c050cb

    SHA512

    98d591b8377ea0471bfe1aea8da7940b54ab67d312041e53e0aeeb541952d3497d82557117148ce8b158270ad3bd3425807644102acada93d4bde8717edd97a4