Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2024, 12:52 UTC

General

  • Target

    Exodus-12.20/Shaders/BasicVS_PBBNCCTTX.cso

  • Size

    12KB

  • MD5

    e8fceb48809206ffa2190926bd94a26b

  • SHA1

    26f008f2887a5dc67be1314a9fc53a3c8895c4e5

  • SHA256

    080dcebbf8a610b6d88311f051f9c12415dd955f052cb8a7bf0f75ad84594421

  • SHA512

    3ea35c400f3e15eb3989d4435618ca640418a74026b7aca8de7f1ed5d6423c8b27b7143b9077f8c67c7784a3caa2ae427dd322800c0c6edbd9aae05c3da6eab1

  • SSDEEP

    192:cRA3axRVvgbeK/p+CzzBnLA7wnrYMMVRFSTF2NMvmv4Wk1PbUCUMUuUD7NU3kUD8:cRA3axRVvgbF/p+CzzFLtneH0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_PBBNCCTTX.cso
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_PBBNCCTTX.cso
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_PBBNCCTTX.cso"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    9f57a81caa7db1f228f8f23129257c69

    SHA1

    108b1b2cb267eb8746c5fb6a2edce3f5c075dfb5

    SHA256

    1208226bba7d0d0ae22e6609d755a5f921197437ffb4c589bdaf5b687ea0945d

    SHA512

    53aed20b2fedae9c834593cef9e163e5b3a5bc49b7bfd0cf7f965f157986eb33216ee4da7f76f1cb165467d7b305224751cf652b44ec0a233834e4c9f8e7f467

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.