Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3controlloi...er.zip
windows7-x64
1controlloi...er.zip
windows10-2004-x64
1controlloi...ignore
windows7-x64
3controlloi...ignore
windows10-2004-x64
3controlloi...ICENSE
windows7-x64
1controlloi...ICENSE
windows10-2004-x64
1controlloi...DME.md
windows7-x64
3controlloi...DME.md
windows10-2004-x64
3controlloi...andler
ubuntu-18.04-amd64
1controlloi...art.sh
ubuntu-18.04-amd64
3controlloi...art.sh
debian-9-armhf
3controlloi...art.sh
debian-9-mips
3controlloi...art.sh
debian-9-mipsel
3controlloi....rules
windows7-x64
3controlloi....rules
windows10-2004-x64
3controlloi...tup.sh
ubuntu-18.04-amd64
3controlloi...tup.sh
debian-9-armhf
3controlloi...tup.sh
debian-9-mips
3controlloi...tup.sh
debian-9-mipsel
3controlloi...HANGES
windows7-x64
1controlloi...HANGES
windows10-2004-x64
1controlloi...DME.js
windows7-x64
1controlloi...DME.js
windows10-2004-x64
1controlloi...ocketd
ubuntu-18.04-amd64
3controlloi...ce.dll
windows7-x64
1controlloi...ce.dll
windows10-2004-x64
1controlloi...er.exe
windows7-x64
1controlloi...er.exe
windows10-2004-x64
1controlloi...rt.bat
windows7-x64
7controlloi...rt.bat
windows10-2004-x64
7controlloi...te.exe
windows7-x64
1controlloi...te.exe
windows10-2004-x64
1Analysis
-
max time kernel
1794s -
max time network
1611s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
01/07/2023, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
controlloid-server-master.zip
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
controlloid-server-master.zip
Resource
win10v2004-20230621-en
Behavioral task
behavioral3
Sample
controlloid-server-master/.gitignore
Resource
win7-20230621-en
Behavioral task
behavioral4
Sample
controlloid-server-master/.gitignore
Resource
win10v2004-20230621-en
Behavioral task
behavioral5
Sample
controlloid-server-master/LICENSE
Resource
win7-20230621-en
Behavioral task
behavioral6
Sample
controlloid-server-master/LICENSE
Resource
win10v2004-20230621-en
Behavioral task
behavioral7
Sample
controlloid-server-master/README.md
Resource
win7-20230621-en
Behavioral task
behavioral8
Sample
controlloid-server-master/README.md
Resource
win10v2004-20230621-en
Behavioral task
behavioral9
Sample
controlloid-server-master/dist/linux/bin/ws_handler
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral10
Sample
controlloid-server-master/dist/linux/start.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral11
Sample
controlloid-server-master/dist/linux/start.sh
Resource
debian9-armhf-20221125-en
Behavioral task
behavioral12
Sample
controlloid-server-master/dist/linux/start.sh
Resource
debian9-mipsbe-20221111-en
Behavioral task
behavioral13
Sample
controlloid-server-master/dist/linux/start.sh
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral14
Sample
controlloid-server-master/dist/linux/udev/77-controlloid-uinput.rules
Resource
win7-20230621-en
Behavioral task
behavioral15
Sample
controlloid-server-master/dist/linux/udev/77-controlloid-uinput.rules
Resource
win10v2004-20230621-en
Behavioral task
behavioral16
Sample
controlloid-server-master/dist/linux/udev/setup.sh
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral17
Sample
controlloid-server-master/dist/linux/udev/setup.sh
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral18
Sample
controlloid-server-master/dist/linux/udev/setup.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral19
Sample
controlloid-server-master/dist/linux/udev/setup.sh
Resource
debian9-mipsel-20221125-en
Behavioral task
behavioral20
Sample
controlloid-server-master/dist/linux/websocketd/CHANGES
Resource
win7-20230621-en
Behavioral task
behavioral21
Sample
controlloid-server-master/dist/linux/websocketd/CHANGES
Resource
win10v2004-20230621-en
Behavioral task
behavioral22
Sample
controlloid-server-master/dist/linux/websocketd/README.js
Resource
win7-20230621-en
Behavioral task
behavioral23
Sample
controlloid-server-master/dist/linux/websocketd/README.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral24
Sample
controlloid-server-master/dist/linux/websocketd/websocketd
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral25
Sample
controlloid-server-master/dist/windows/bin/vJoyInterface.dll
Resource
win7-20230621-en
Behavioral task
behavioral26
Sample
controlloid-server-master/dist/windows/bin/vJoyInterface.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral27
Sample
controlloid-server-master/dist/windows/bin/ws_handler.exe
Resource
win7-20230621-en
Behavioral task
behavioral28
Sample
controlloid-server-master/dist/windows/bin/ws_handler.exe
Resource
win10v2004-20230621-en
Behavioral task
behavioral29
Sample
controlloid-server-master/dist/windows/start.bat
Resource
win7-20230621-en
Behavioral task
behavioral30
Sample
controlloid-server-master/dist/windows/start.bat
Resource
win10v2004-20230621-en
Behavioral task
behavioral31
Sample
controlloid-server-master/dist/windows/vjoy/elevate.exe
Resource
win7-20230621-en
Behavioral task
behavioral32
Sample
controlloid-server-master/dist/windows/vjoy/elevate.exe
Resource
win10v2004-20230621-en
General
-
Target
controlloid-server-master/README.md
-
Size
1KB
-
MD5
e330c78a3fe144d9a5c6e0ff115b2294
-
SHA1
03b7e624a570764b2408b1929b4dbcddd0bea1f7
-
SHA256
ef508132ced0fa11fdf5b209bea2b51a0ecc0c78d9d6538580d3520062d44dd0
-
SHA512
e984a8256e3b79824564f7ef112ce93de23919f0c42d7fa2111d3b3428ec89f5b2b016f7ae093b292b3f9fda134d20da91f36ad71cfdde89d61a8570ecc29898
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\md_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\md_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 432 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 432 AcroRd32.exe 432 AcroRd32.exe 432 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1444 1572 cmd.exe 27 PID 1572 wrote to memory of 1444 1572 cmd.exe 27 PID 1572 wrote to memory of 1444 1572 cmd.exe 27 PID 1444 wrote to memory of 432 1444 rundll32.exe 28 PID 1444 wrote to memory of 432 1444 rundll32.exe 28 PID 1444 wrote to memory of 432 1444 rundll32.exe 28 PID 1444 wrote to memory of 432 1444 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\controlloid-server-master\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:432
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52519ddf2302a8d33e567294bf2330d40
SHA18523ab8cec7906d1873546db325024f4a28281bc
SHA25684f4d2661292c723416f1f4992b0ccfbe0043f856a8a3d5be91a9b9343961e2a
SHA512baaeeaa80806de5964e0a45e017d36f8360632cf36b1644a0916ddad957759e78978a933b860a8cc439c050eacf61e407b4fda1bc33facd92ff984b79395db9a