Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    844s
  • max time network
    849s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 22:50 UTC

General

  • Target

    ReBomb2-main/ReBomb2.py

  • Size

    3KB

  • MD5

    77b20e4be3d6243c6a6db9cc315be59b

  • SHA1

    66fb3afcda8efb4123f2f44995befe7f591f034a

  • SHA256

    47dc1c198c6212f1479bfbb9ff3e091a5f2b904528dcc4212d0308808895f7a5

  • SHA512

    4225d5f5ed95d23a6fdda3a2e06ae196538a01d22991b232466680c479574d2cfab53ba2dd0af29f7cb850bce4f2a6e11256aa817a4a3ac0122e49ba4095e6c8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ReBomb2-main\ReBomb2.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ReBomb2-main\ReBomb2.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ReBomb2-main\ReBomb2.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    bd8056dd1dfa6e37d58da121f5b15cd1

    SHA1

    818f8913052d974eaf3fcc6e8bc86db1f39652d6

    SHA256

    2de24908a2cecf1d6f0916b9b29b997f259906a23af3afa503b8e8dad148dd8e

    SHA512

    42e33564747ec25386567b4373be812f78c47ce16b06ec922ba84bf296b68180e8afc3615f9656fa81d1893b824d66e54e1b196566a92cac91f73f5731f8f4a9

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.