Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7GB_b19741fxj.apk
android-9-x86
1YOWA.html
windows7-x64
1YOWA.html
windows10-2004-x64
1changelog-ar.html
windows7-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows7-x64
1changelog.html
windows10-2004-x64
1clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows7-x64
1credits.html
windows10-2004-x64
1e0012.png
windows7-x64
3e0012.png
windows10-2004-x64
3e0231.png
windows7-x64
3e0231.png
windows10-2004-x64
3e0537.png
windows7-x64
3e0537.png
windows10-2004-x64
3e1296.obi
windows7-x64
3e1296.obi
windows10-2004-x64
5e1299.png
windows7-x64
3e1299.png
windows10-2004-x64
3e1300.png
windows7-x64
3e1300.png
windows10-2004-x64
3e1302.png
windows7-x64
3e1302.png
windows10-2004-x64
3e1439.png
windows7-x64
3e1439.png
windows10-2004-x64
3e1440.png
windows7-x64
3e1440.png
windows10-2004-x64
3e1441.obi
windows7-x64
3Resubmissions
06/07/2023, 18:35
230706-w8fqlsdg43 706/07/2023, 18:32
230706-w6mfdadg35 706/07/2023, 18:27
230706-w34kgsdg32 705/07/2023, 09:21
230705-lbqjfabd66 705/07/2023, 08:59
230705-kxxdfach7v 705/07/2023, 08:41
230705-klwmrscg9y 705/07/2023, 07:15
230705-h3aqhscf6z 705/07/2023, 07:13
230705-h2e9lsba95 705/07/2023, 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
135s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
YOWA.html
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
changelog-ar.html
Resource
win7-20230621-en
Behavioral task
behavioral5
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
changelog.html
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
clockDarkTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
credits.html
Resource
win7-20230621-en
Behavioral task
behavioral13
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
e0012.png
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
e0012.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
e0231.png
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
e0231.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
e0537.png
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
e0537.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
e1296.obi
Resource
win7-20230621-en
Behavioral task
behavioral21
Sample
e1296.obi
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
e1299.png
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
e1299.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
e1300.png
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
e1300.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
e1302.png
Resource
win7-20230703-en
Behavioral task
behavioral27
Sample
e1302.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
e1439.png
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
e1439.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
e1440.png
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
e1440.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
e1441.obi
Resource
win7-20230703-en
General
-
Target
e1441.obi
-
Size
765B
-
MD5
1bf6c7aa10ef1aa789f9183fb3184253
-
SHA1
d7f41db0f9657b22434960ddb5861bb7044e5be8
-
SHA256
b61de6c773623883c3fbe9b0366410198c5c598da725d2abaee376a55e8f87e1
-
SHA512
5098845598efa2185454f679637adf843627fd35a61a142ae203c5ce90629957feb16f0adc7855c3a9bd9c12fc77a7335b87913544f69270d71e85820e87c3ed
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.obi\ = "obi_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\obi_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\obi_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\obi_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\obi_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\obi_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\obi_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.obi rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2056 AcroRd32.exe 2056 AcroRd32.exe 2056 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1684 2100 cmd.exe 30 PID 2100 wrote to memory of 1684 2100 cmd.exe 30 PID 2100 wrote to memory of 1684 2100 cmd.exe 30 PID 1684 wrote to memory of 2056 1684 rundll32.exe 31 PID 1684 wrote to memory of 2056 1684 rundll32.exe 31 PID 1684 wrote to memory of 2056 1684 rundll32.exe 31 PID 1684 wrote to memory of 2056 1684 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\e1441.obi1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\e1441.obi2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e1441.obi"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d28c68d5e3f09b363c5eb18e0d2e0097
SHA162190909e0ef7c09b2b57b198f5b3b8ce01fb1b2
SHA2567fc24d1e950cae23232c1b810504c53c9238afd8c9a0739c9f2a25049972dad4
SHA51246dbd242094a07d91e050fe33ed45929e4084b205be8c3423a418fe46c01c7940bfc8cbd464a904681dc7f781be024b4d6da718879bde10a4276fc10eacc0cc2