Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1mybb_1835.zip
windows7-x64
1mybb_1835.zip
windows10-2004-x64
1Upload/adm...rs.php
windows7-x64
3Upload/adm...rs.php
windows10-2004-x64
3Upload/adm...gs.php
windows7-x64
3Upload/adm...gs.php
windows10-2004-x64
3Upload/adm...og.php
windows7-x64
3Upload/adm...og.php
windows10-2004-x64
3Upload/adm...fo.php
windows7-x64
3Upload/adm...fo.php
windows10-2004-x64
3Upload/adm...ld.php
windows7-x64
3Upload/adm...ld.php
windows10-2004-x64
3Upload/adm...ta.php
windows7-x64
3Upload/adm...ta.php
windows10-2004-x64
3Upload/adm...es.php
windows7-x64
3Upload/adm...es.php
windows10-2004-x64
3Upload/adm...ig.css
windows7-x64
3Upload/adm...ig.css
windows10-2004-x64
3Upload/adm...um.css
windows7-x64
3Upload/adm...um.css
windows10-2004-x64
3Upload/adm...me.css
windows7-x64
3Upload/adm...me.css
windows10-2004-x64
3Upload/adm...se.png
windows7-x64
3Upload/adm...se.png
windows10-2004-x64
3Upload/adm...ff.png
windows7-x64
3Upload/adm...ff.png
windows10-2004-x64
3Upload/adm...on.png
windows7-x64
3Upload/adm...on.png
windows10-2004-x64
3Upload/adm...ss.png
windows7-x64
3Upload/adm...ss.png
windows10-2004-x64
3Upload/adm...om.png
windows7-x64
3Upload/adm...om.png
windows10-2004-x64
3Analysis
-
max time kernel
152s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
mybb_1835.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
mybb_1835.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Upload/admin/modules/tools/mailerrors.php
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Upload/admin/modules/tools/mailerrors.php
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Upload/admin/modules/tools/maillogs.php
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Upload/admin/modules/tools/maillogs.php
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Upload/admin/modules/tools/modlog.php
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Upload/admin/modules/tools/modlog.php
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Upload/admin/modules/tools/php_info.php
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
Upload/admin/modules/tools/php_info.php
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
Upload/admin/modules/tools/recount_rebuild.php
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
Upload/admin/modules/tools/recount_rebuild.php
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
Upload/admin/modules/user/module_meta.php
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
Upload/admin/modules/user/module_meta.php
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
Upload/admin/modules/user/titles.php
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
Upload/admin/modules/user/titles.php
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
Upload/admin/styles/default/config.css
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
Upload/admin/styles/default/config.css
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
Upload/admin/styles/default/forum.css
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
Upload/admin/styles/default/forum.css
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
Upload/admin/styles/default/home.css
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
Upload/admin/styles/default/home.css
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
Upload/admin/styles/default/images/close.png
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
Upload/admin/styles/default/images/close.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
Upload/admin/styles/default/images/icons/bullet_off.png
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
Upload/admin/styles/default/images/icons/bullet_off.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
Upload/admin/styles/default/images/icons/bullet_on.png
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
Upload/admin/styles/default/images/icons/bullet_on.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
Upload/admin/styles/default/images/icons/cross.png
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
Upload/admin/styles/default/images/icons/cross.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
Upload/admin/styles/default/images/icons/custom.png
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
Upload/admin/styles/default/images/icons/custom.png
Resource
win10v2004-20230703-en
General
-
Target
Upload/admin/modules/tools/php_info.php
-
Size
974B
-
MD5
2bb3c7755ffdd71c7b4528bdbf0c9d0d
-
SHA1
98c095a44e5feaf802c4bc342f79b2576f3c58e3
-
SHA256
5da0cc50a808a7405a948b22bde1ed3a82095b25b908b552aeb41ae164c90111
-
SHA512
e8f2132965b1556f82d1e92adce1434b97313ddc9b905d1c6f74ca9519c3257e6dc2e07bab015ea86e0bd6f5f7cf50c7a2abdb3edd5ecb7a2e9e71519947394b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.php\ = "php_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\php_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\php_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\php_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\php_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\php_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.php rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\php_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2924 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2924 AcroRd32.exe 2924 AcroRd32.exe 2924 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1692 2044 cmd.exe 29 PID 2044 wrote to memory of 1692 2044 cmd.exe 29 PID 2044 wrote to memory of 1692 2044 cmd.exe 29 PID 1692 wrote to memory of 2924 1692 rundll32.exe 30 PID 1692 wrote to memory of 2924 1692 rundll32.exe 30 PID 1692 wrote to memory of 2924 1692 rundll32.exe 30 PID 1692 wrote to memory of 2924 1692 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Upload\admin\modules\tools\php_info.php1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Upload\admin\modules\tools\php_info.php2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Upload\admin\modules\tools\php_info.php"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d8c0baa8c7d8c5524f40b602401d8572
SHA154958d3a047a3cd6adf6631cbacd29fc8904a407
SHA256d921aa9e392f10a18840953969c70ef6a99ef962f75e7ded8bb35cdf683202f7
SHA512d9badeefaf5db16c2bfee3a6de77f691bac949496ec9d0cdca659325cacce2d48170f168f88d70843b7f1bbce176e016fcfdfb843319c942451d77cc2949192b