Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7GB_b19741fxj.apk
android-9-x86
1Bariol-Bold.ttf
windows7-x64
3Bariol-Bold.ttf
windows10-2004-x64
7YOWA.html
windows7-x64
1YOWA.html
windows10-2004-x64
1changelog-ar.html
windows7-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows7-x64
1changelog.html
windows10-2004-x64
1clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows7-x64
1credits.html
windows10-2004-x64
1e0012.png
windows7-x64
3e0012.png
windows10-2004-x64
3e1315.obi
windows7-x64
3e1315.obi
windows10-2004-x64
3ic_content...on.xml
windows7-x64
1ic_content...on.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
1ic_content...ck.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
1ic_content...ck.xml
windows10-2004-x64
1ic_content...ld.xml
windows7-x64
1ic_content...ld.xml
windows10-2004-x64
1l17846d7a_a32.so
debian-9-armhf
1l17846d7a_a64.so
ubuntu-18.04-amd64
l17846d7a_a64.so
debian-9-armhf
l17846d7a_a64.so
debian-9-mips
l17846d7a_a64.so
debian-9-mipsel
Resubmissions
06/07/2023, 18:35
230706-w8fqlsdg43 706/07/2023, 18:32
230706-w6mfdadg35 706/07/2023, 18:27
230706-w34kgsdg32 705/07/2023, 09:21
230705-lbqjfabd66 705/07/2023, 08:59
230705-kxxdfach7v 705/07/2023, 08:41
230705-klwmrscg9y 705/07/2023, 07:15
230705-h3aqhscf6z 705/07/2023, 07:13
230705-h2e9lsba95 705/07/2023, 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Bariol-Bold.ttf
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
Bariol-Bold.ttf
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
YOWA.html
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
changelog-ar.html
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
changelog.html
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
clockDarkTheme.xml
Resource
win7-20230705-en
Behavioral task
behavioral11
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
credits.html
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
e0012.png
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
e0012.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
e1315.obi
Resource
win7-20230705-en
Behavioral task
behavioral19
Sample
e1315.obi
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
ic_content_sticker_location.xml
Resource
win7-20230703-en
Behavioral task
behavioral21
Sample
ic_content_sticker_location.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
ic_content_sticker_location_black.xml
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
ic_content_sticker_location_black.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
ic_content_sticker_location_emerald.xml
Resource
win7-20230705-en
Behavioral task
behavioral27
Sample
ic_content_sticker_location_emerald.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
l17846d7a_a32.so
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral29
Sample
l17846d7a_a64.so
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral30
Sample
l17846d7a_a64.so
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral31
Sample
l17846d7a_a64.so
Resource
debian9-mipsbe-20221111-en
Behavioral task
behavioral32
Sample
l17846d7a_a64.so
Resource
debian9-mipsel-20221125-en
General
-
Target
e1315.obi
-
Size
1KB
-
MD5
988f3ecf99b1d9444b5391ea3350d7fc
-
SHA1
5a498f9e5b79aeaec9618a1f244fa0def325b34b
-
SHA256
2b07eac5177646c70bac672a7a8e0c45bee2a2b04d9a29b278cd025c67e59d15
-
SHA512
24f041418a5fbb636ac7b62704de026940b30da2783cc492b49e5abb29ccce6c6a6345e7cfe8f42ea917a5ffc3f9298f00a561a41aea82891c4a64a3ab76bd5d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\obi_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\obi_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\obi_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\obi_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\obi_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.obi rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.obi\ = "obi_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\obi_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3004 AcroRd32.exe 3004 AcroRd32.exe 3004 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2912 2148 cmd.exe 28 PID 2148 wrote to memory of 2912 2148 cmd.exe 28 PID 2148 wrote to memory of 2912 2148 cmd.exe 28 PID 2912 wrote to memory of 3004 2912 rundll32.exe 29 PID 2912 wrote to memory of 3004 2912 rundll32.exe 29 PID 2912 wrote to memory of 3004 2912 rundll32.exe 29 PID 2912 wrote to memory of 3004 2912 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\e1315.obi1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\e1315.obi2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e1315.obi"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a5d679eee521884ba80d77219f3d9416
SHA1297ffa7da6566cafcb29be12b7c2c946cb5335d1
SHA25624d1d1d330f67d2b17fc374ec8292e2f5a3a1a59c96757b6b867c81c7b68220a
SHA512080ffc71bcd6840d123a0bc9008e34c3684a82267ee3b7adc0ffce97306b74caee394a9f4eb552a31ea309bd5f4f2bde15ec0cddc4937d364e05bc1384d2f017