Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
.appodeal2
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
.appodeal2
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
.appodeal2
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
.appodeal2
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral5
Sample
.appodeal2
Resource
android-x64-20220823-en
Behavioral task
behavioral6
Sample
.appodeal2
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral7
Sample
.appodeal2
Resource
macos-20220504-en
General
-
Target
.appodeal2
-
Size
61B
-
MD5
48742fdde3c2dc53140013e20cb98005
-
SHA1
a2b00f933245cee3ea6ea434ebbbe4d284d6c21e
-
SHA256
66bfc31be4cbd656d62a2bebe38c6ffdf9095eb87e69fe81e797cedcba9d159a
-
SHA512
03ffdc64ff6c5d7c455d25771f8ab9c70dbd8a60478512775679d1f37d41b1f47927466b4f06f6f9487d2523ba8128f75a6c6780c46946f0e99dc605d0f21436
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\appodeal2_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\appodeal2_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\appodeal2_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\appodeal2_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.appodeal2 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.appodeal2\ = "appodeal2_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\appodeal2_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\appodeal2_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 632 AcroRd32.exe 632 AcroRd32.exe 632 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1380 wrote to memory of 980 1380 cmd.exe 29 PID 1380 wrote to memory of 980 1380 cmd.exe 29 PID 1380 wrote to memory of 980 1380 cmd.exe 29 PID 980 wrote to memory of 632 980 rundll32.exe 30 PID 980 wrote to memory of 632 980 rundll32.exe 30 PID 980 wrote to memory of 632 980 rundll32.exe 30 PID 980 wrote to memory of 632 980 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.appodeal21⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.appodeal22⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.appodeal2"3⤵
- Suspicious use of SetWindowsHookEx
PID:632
-
-