Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2024, 09:02

General

  • Target

    vanish-flooder-main/assets/utility/util.py

  • Size

    1KB

  • MD5

    414f8cb6394e604ba72d86ed0990305d

  • SHA1

    92373b782ff71259466ae6eb76efb5aeab307bbb

  • SHA256

    536d8e4094871ea5da7e7e28b1b6384f938d8d592fbf1e455aa3e0ea31c2985a

  • SHA512

    a8876842c73ab86c996852ecb3ebb68c8c48ac379d0dded5deffd8d679951d9834026cba34c007cbe9e74e323f892a9da9c213a6439d542897db284336edba83

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\vanish-flooder-main\assets\utility\util.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\vanish-flooder-main\assets\utility\util.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\vanish-flooder-main\assets\utility\util.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    bc7a084d1e77f9676fa8dd4f7404c273

    SHA1

    b8246fa16aa48523663298e7edcf3d6fab06c317

    SHA256

    a97d1327590cd00e3fc33077d627a60156ee628b981e92b7c5d4e2cd3a731cc4

    SHA512

    3e9c9ec4f11301382b727631db9f7dedaac115655c23203bd86cbcdc0a9aaa9347fdf3b1c08bcdc192ba1daf3545820ed594b552482c421f31127cfe10cfd76a