Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ReBomb2-ma...b2.exe
windows7-x64
7ReBomb2-ma...b2.exe
windows10-2004-x64
7ReBomb2-ma...mb2.py
windows7-x64
3ReBomb2-ma...mb2.py
windows10-2004-x64
3ReBomb2-ma...YOP.py
windows7-x64
3ReBomb2-ma...YOP.py
windows10-2004-x64
3Rebomb2AYO...App.py
windows7-x64
3Rebomb2AYO...App.py
windows10-2004-x64
3Rebomb2AYO...pp.exe
windows7-x64
7Rebomb2AYO...pp.exe
windows10-2004-x64
7Rebomb2AYO...pp.pkg
macos-10.15-amd64
Rebomb2AYO...t__.py
windows7-x64
3Rebomb2AYO...t__.py
windows10-2004-x64
3Rebomb2AYO...11.pyc
windows7-x64
3Rebomb2AYO...11.pyc
windows10-2004-x64
3Rebomb2AYO...n__.py
windows7-x64
3Rebomb2AYO...n__.py
windows10-2004-x64
3Rebomb2AYO...11.pyc
windows7-x64
3Rebomb2AYO...11.pyc
windows10-2004-x64
3ReBomb2App...to.vbs
windows7-x64
1ReBomb2App...to.vbs
windows10-2004-x64
1ReBomb2App...ck.vbs
windows7-x64
1ReBomb2App...ck.vbs
windows10-2004-x64
1ReBomb2App...tp.ps1
windows7-x64
3ReBomb2App...tp.ps1
windows10-2004-x64
3ReBomb2App...it.vbs
windows7-x64
1ReBomb2App...it.vbs
windows10-2004-x64
1ReBomb2App...ox.vbs
windows7-x64
1ReBomb2App...ox.vbs
windows10-2004-x64
1ReBomb2App...et.vbs
windows7-x64
1ReBomb2App...et.vbs
windows10-2004-x64
1ReBomb2App...nu.vbs
windows7-x64
1Analysis
-
max time kernel
839s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 22:50
Behavioral task
behavioral1
Sample
ReBomb2-main/ReBomb2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ReBomb2-main/ReBomb2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ReBomb2-main/ReBomb2.py
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ReBomb2-main/ReBomb2.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ReBomb2-main/ReBomb2AppAYOP.py
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
ReBomb2-main/ReBomb2AppAYOP.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Rebomb2AYOP/ReBomb2App.py
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Rebomb2AYOP/ReBomb2App.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Rebomb2AYOP/ReBomb2App/ReBomb2App.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Rebomb2AYOP/ReBomb2App/ReBomb2App.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Rebomb2AYOP/ReBomb2App/ReBomb2App.pkg
Resource
macos-20241101-en
Behavioral task
behavioral12
Sample
Rebomb2AYOP/ReBomb2App/fonts/__init__.py
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Rebomb2AYOP/ReBomb2App/fonts/__init__.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Rebomb2AYOP/ReBomb2App/fonts/__pycache__/__init__.cpython-311.pyc
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
Rebomb2AYOP/ReBomb2App/fonts/__pycache__/__init__.cpython-311.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Rebomb2AYOP/ReBomb2App/pyfiglet/__main__.py
Resource
win7-20240729-en
Behavioral task
behavioral17
Sample
Rebomb2AYOP/ReBomb2App/pyfiglet/__main__.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Rebomb2AYOP/ReBomb2App/pyfiglet/__pycache__/__init__.cpython-311.pyc
Resource
win7-20241010-en
Behavioral task
behavioral19
Sample
Rebomb2AYOP/ReBomb2App/pyfiglet/__pycache__/__init__.cpython-311.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
ReBomb2AppFinal/tcl/auto.vbs
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
ReBomb2AppFinal/tcl/auto.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
ReBomb2AppFinal/tcl/clock.vbs
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
ReBomb2AppFinal/tcl/clock.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
ReBomb2AppFinal/tcl/http1.0/http.ps1
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
ReBomb2AppFinal/tcl/http1.0/http.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
ReBomb2AppFinal/tcl/init.vbs
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
ReBomb2AppFinal/tcl/init.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
ReBomb2AppFinal/tk/listbox.vbs
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
ReBomb2AppFinal/tk/listbox.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
ReBomb2AppFinal/tk/megawidget.vbs
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
ReBomb2AppFinal/tk/megawidget.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
ReBomb2AppFinal/tk/menu.vbs
Resource
win7-20240903-en
General
-
Target
Rebomb2AYOP/ReBomb2App/pyfiglet/__main__.py
-
Size
88B
-
MD5
d2e89bc79127ec20261386b3c74f3d45
-
SHA1
95443a2be7a3f97cbb54302bd139320b63485c6c
-
SHA256
2556dd011b56a2779b856f1c0c001f82e7c1f3c4a45c5755c3030062533339e9
-
SHA512
0c2cba724663739ab039ed59f000bf9b92eafc8a705b0c26c3dd1823a814023083af668fca3770ac2bcc577cc0a767ecd8f58e73a0fdbbaa503058397df62930
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2520 AcroRd32.exe 2520 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2624 2780 cmd.exe 32 PID 2780 wrote to memory of 2624 2780 cmd.exe 32 PID 2780 wrote to memory of 2624 2780 cmd.exe 32 PID 2624 wrote to memory of 2520 2624 rundll32.exe 33 PID 2624 wrote to memory of 2520 2624 rundll32.exe 33 PID 2624 wrote to memory of 2520 2624 rundll32.exe 33 PID 2624 wrote to memory of 2520 2624 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Rebomb2AYOP\ReBomb2App\pyfiglet\__main__.py1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Rebomb2AYOP\ReBomb2App\pyfiglet\__main__.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Rebomb2AYOP\ReBomb2App\pyfiglet\__main__.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5433433d3bb89ce51c26c53dc90acbd72
SHA110dfc35f94c84b13ef714bd2001162e075eaa6ca
SHA2565e8c7cd4b7c60f0dcc367163da8ec51a48b8f23fdd6d7dc737ef38c4e3821018
SHA51255b8612b9280f81e44b47a376a5876571f6cf647a4c0d23ff4ea08981be17f7065afcc1c196f324e0e805052f8e89fb23c18925be0e209345a22777609bc8e08