Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    721s
  • max time network
    728s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 22:50

General

  • Target

    Rebomb2AYOP/ReBomb2App/pyfiglet/__pycache__/__init__.cpython-311.pyc

  • Size

    46KB

  • MD5

    cf9a8f358835988d16552ccd944173b9

  • SHA1

    e0d5abc01df996edd0a94e703f0b0c62331a29a2

  • SHA256

    35467169be4dbb129dffd1d939900edfb9a822a35f98679481dd2338d343d1fd

  • SHA512

    f25923055e7debfb0a5e4fbd8b7042559d2c8c8136630fedaecb21c250b9c6803740f7b4cb071dcdf328dcb0d3838c907c6d47f1a61c17fc21002fdc6d9e158d

  • SSDEEP

    768:ml3uE47I8l1s1zHxEFfr+Md49heax4r94WcJL+Me4Z0p7QS2:m1uEAI812HxEFf/CeaxrM4Ub2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Rebomb2AYOP\ReBomb2App\pyfiglet\__pycache__\__init__.cpython-311.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Rebomb2AYOP\ReBomb2App\pyfiglet\__pycache__\__init__.cpython-311.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Rebomb2AYOP\ReBomb2App\pyfiglet\__pycache__\__init__.cpython-311.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f6048f48533d0366abfe34a38b5ea126

    SHA1

    0164600a885973d41075a962e90d414feefa335b

    SHA256

    2b711e47e7ea26f0de29ca1c3a197953db4f07590848103f2002da584865bb2c

    SHA512

    41d6e6d35a67c84b2c3247fc840e4684f91796e95a11b3124d5626513b965385f3d305449f6cc5ef8833355de21d499cdaf3c54b51d6911d42205c974cf627be