Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1libpython3loader.so
windows7-x64
3libpython3loader.so
windows10-1703-x64
3libpython3loader.so
windows10-2004-x64
3libpython3loader.so
android-10-x64
libpython3loader.so
android-11-x64
libpython3loader.so
android-9-x86
libpython3loader.so
macos-10.15-amd64
1libpython3loader.so
debian-9-armhf
libpython3loader.so
debian-9-mips
libpython3loader.so
debian-9-mipsel
libpython3loader.so
ubuntu-18.04-amd64
1Analysis
-
max time kernel
1198s -
max time network
877s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2023, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
libpython3loader.so
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
libpython3loader.so
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
libpython3loader.so
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
libpython3loader.so
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
libpython3loader.so
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
libpython3loader.so
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral7
Sample
libpython3loader.so
Resource
macos-20220504-en
Behavioral task
behavioral8
Sample
libpython3loader.so
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral9
Sample
libpython3loader.so
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
libpython3loader.so
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral11
Sample
libpython3loader.so
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
libpython3loader.so
-
Size
29KB
-
MD5
eabc98ed45b20f8d8c2574b3328f4e1b
-
SHA1
c05b809128fe03553cbf149dd6f68aa4e7418a37
-
SHA256
c3d8716adbb81d658e418bffd1ccd5d301b77af479310d4853e3ca013fe90f74
-
SHA512
1b78e9059a9ad5c4ea7406a222a9e6eac1c81c9fa70f216d69d4f2637bd9e3b1c06419382ef800add99e37a90689075531671f2e23876669d1d22c9f830454be
-
SSDEEP
384:diICk4UprcOuofUPwwt15JuxDMeqOI4Hq1SJpds:0ID4yzuofuD15JuxDxqO4Mds
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\so_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\so_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.so rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\so_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\so_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.so\ = "so_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\so_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\so_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 524 AcroRd32.exe 524 AcroRd32.exe 524 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 924 wrote to memory of 592 924 cmd.exe 29 PID 924 wrote to memory of 592 924 cmd.exe 29 PID 924 wrote to memory of 592 924 cmd.exe 29 PID 592 wrote to memory of 524 592 rundll32.exe 30 PID 592 wrote to memory of 524 592 rundll32.exe 30 PID 592 wrote to memory of 524 592 rundll32.exe 30 PID 592 wrote to memory of 524 592 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\libpython3loader.so1⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\libpython3loader.so2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\libpython3loader.so"3⤵
- Suspicious use of SetWindowsHookEx
PID:524
-
-