Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7GB_b19741fxj.apk
android-9-x86
Norican-Regular.ttf
windows7-x64
3Norican-Regular.ttf
windows10-2004-x64
7Norican.ttf
windows7-x64
3Norican.ttf
windows10-2004-x64
7YOWA.html
windows7-x64
1YOWA.html
windows10-2004-x64
1changelog-ar.html
windows7-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows7-x64
changelog.html
windows10-2004-x64
1cl-message...erties
windows7-x64
3cl-message...erties
windows10-2004-x64
3clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows7-x64
1credits.html
windows10-2004-x64
animations...6.json
windows7-x64
3animations...6.json
windows10-2004-x64
3manifest.json
windows7-x64
3manifest.json
windows10-2004-x64
3ic_content...on.xml
windows7-x64
1ic_content...on.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
ic_content...ck.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
1ic_content...ck.xml
windows10-2004-x64
1ic_content...ld.xml
windows7-x64
1ic_content...ld.xml
windows10-2004-x64
1l17846d7a_a32.so
debian-9-armhf
1Resubmissions
06/07/2023, 18:35
230706-w8fqlsdg43 706/07/2023, 18:32
230706-w6mfdadg35 706/07/2023, 18:27
230706-w34kgsdg32 705/07/2023, 09:21
230705-lbqjfabd66 705/07/2023, 08:59
230705-kxxdfach7v 705/07/2023, 08:41
230705-klwmrscg9y 705/07/2023, 07:15
230705-h3aqhscf6z 705/07/2023, 07:13
230705-h2e9lsba95 705/07/2023, 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
301s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Norican-Regular.ttf
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
Norican-Regular.ttf
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
Norican.ttf
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
Norican.ttf
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
YOWA.html
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
changelog-ar.html
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
changelog.html
Resource
win7-20230621-en
Behavioral task
behavioral11
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
cl-messages_en_us.properties
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
cl-messages_en_us.properties
Resource
win10v2004-20230621-en
Behavioral task
behavioral14
Sample
clockDarkTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
credits.html
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
animations/lf30_editor_cjab5ej6.json
Resource
win7-20230703-en
Behavioral task
behavioral21
Sample
animations/lf30_editor_cjab5ej6.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
manifest.json
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
manifest.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
ic_content_sticker_location.xml
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
ic_content_sticker_location.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win7-20230621-en
Behavioral task
behavioral27
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
ic_content_sticker_location_black.xml
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
ic_content_sticker_location_black.xml
Resource
win10v2004-20230621-en
Behavioral task
behavioral30
Sample
ic_content_sticker_location_emerald.xml
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
ic_content_sticker_location_emerald.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
l17846d7a_a32.so
Resource
debian9-armhf-20221111-en
General
-
Target
cl-messages_en_us.properties
-
Size
1KB
-
MD5
35c5cc3173e8077f14a2f281855e750c
-
SHA1
3c8a782a9732c3d627f1f487be91ad5f6c5f826a
-
SHA256
4510dd1cba41cadfaf4115b5e27b543ac0ddcd94e746faaac610654a0ff62b94
-
SHA512
0c552132dfb8725e5f52cb0677d98273f87e45be456bbb7c090d2a82c2926bb0e3f43ad602a9f39e84270eba6486fa6e4a1307db42ba4dbba73a3ee6121741a2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\properties_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\properties_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\properties_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\.properties rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\properties_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\properties_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\.properties\ = "properties_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\properties_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 364 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 364 AcroRd32.exe 364 AcroRd32.exe 364 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2892 1152 cmd.exe 30 PID 1152 wrote to memory of 2892 1152 cmd.exe 30 PID 1152 wrote to memory of 2892 1152 cmd.exe 30 PID 2892 wrote to memory of 364 2892 rundll32.exe 31 PID 2892 wrote to memory of 364 2892 rundll32.exe 31 PID 2892 wrote to memory of 364 2892 rundll32.exe 31 PID 2892 wrote to memory of 364 2892 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cl-messages_en_us.properties1⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cl-messages_en_us.properties2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cl-messages_en_us.properties"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:364
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b8a3c047b3f55cd5b6b5bd1a3e306fe
SHA1afd66aa5651f9369d9f3f3d3a9c6ef73048fcbb4
SHA256671d9fbcbe631f2d854fc3fb7ff5786811dc6e47cb30619f0b7aafbccf3264d9
SHA512ec1df8ffc2a97ed285347f724725277f92084d10c7402c182aa558f93ad7751e9542fef704a0710292ee8109eb153cd9a6984d3c3906f407f5c53e5e8b20fefd