Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
native/__init__.pyo
windows7-x64
3native/__init__.pyo
windows10-2004-x64
3native/ani...__.pyo
windows7-x64
3native/ani...__.pyo
windows10-2004-x64
3native/ani...rb.pyo
windows7-x64
3native/ani...rb.pyo
windows10-2004-x64
3native/per...__.pyo
windows7-x64
3native/per...__.pyo
windows10-2004-x64
3native/per...rs.pyo
windows7-x64
3native/per...rs.pyo
windows10-2004-x64
3native/rou...__.pyo
windows7-x64
3native/rou...__.pyo
windows10-2004-x64
3native/rou...ty.pyo
windows7-x64
3native/rou...ty.pyo
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
native/__init__.pyo
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
native/__init__.pyo
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
native/animation/__init__.pyo
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
native/animation/__init__.pyo
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
native/animation/arb.pyo
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
native/animation/arb.pyo
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
native/performance/__init__.pyo
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
native/performance/__init__.pyo
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
native/performance/counters.pyo
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
native/performance/counters.pyo
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
native/routing/__init__.pyo
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
native/routing/__init__.pyo
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
native/routing/connectivity.pyo
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
native/routing/connectivity.pyo
Resource
win10v2004-20221111-en
General
-
Target
native/animation/arb.pyo
-
Size
19KB
-
MD5
f4fe1988c88f7c7b9999ab9738e4d3f2
-
SHA1
3638c41ca110b740c7e4b0110db84c2df9faf32f
-
SHA256
24a70a457eda4b8c855563fd20a5e0a05b84724728b431f554b46456e0acd8e8
-
SHA512
1f6e7ea5b8630495b7283adb5f4d5a030d68ee6e40f932e25221a5d9e2ea7f9ebc08bbd1fceea1004b5486196100e8dda5371f6cae5bc67367f7fc50a788eafb
-
SSDEEP
192:mHrkgvfoK2wPIFBvlDfstGJvl7c2IlmzJlIlowKpK6ZcUoLmLENWt3Ze7xl1rjgY:6dhilZ06vdKK4xr2LZ/CncvY2R9IJ9r
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\pyo_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\pyo_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\pyo_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.pyo rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\pyo_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.pyo\ = "pyo_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\pyo_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\pyo_auto_file rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1076 1464 cmd.exe 27 PID 1464 wrote to memory of 1076 1464 cmd.exe 27 PID 1464 wrote to memory of 1076 1464 cmd.exe 27 PID 1076 wrote to memory of 360 1076 rundll32.exe 28 PID 1076 wrote to memory of 360 1076 rundll32.exe 28 PID 1076 wrote to memory of 360 1076 rundll32.exe 28 PID 1076 wrote to memory of 360 1076 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\native\animation\arb.pyo1⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\native\animation\arb.pyo2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\native\animation\arb.pyo"3⤵
- Suspicious use of SetWindowsHookEx
PID:360
-
-