Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Arm Max_�...�).apk
android-9-x86
5Arm Max_�...�).apk
android-10-x64
1Arm Max_�...�).apk
android-11-x64
1debug.keystore
windows7-x64
3debug.keystore
windows10-2004-x64
3highlight-init.js
windows7-x64
1highlight-init.js
windows10-2004-x64
1highlight.js
windows7-x64
1highlight.js
windows10-2004-x64
1jquery-3.1.1.min.js
windows7-x64
1jquery-3.1.1.min.js
windows10-2004-x64
1mathjax-config.js
windows7-x64
1mathjax-config.js
windows10-2004-x64
1my-script.js
windows7-x64
1my-script.js
windows10-2004-x64
1tooltipster-init.js
windows7-x64
1tooltipster-init.js
windows10-2004-x64
1tooltipste...in.css
windows7-x64
3tooltipste...in.css
windows10-2004-x64
3tooltipste...min.js
windows7-x64
1tooltipste...min.js
windows10-2004-x64
1Resubmissions
10/08/2023, 16:05
230810-tjfyzage7s 710/08/2023, 15:55
230810-tc5czsgd6t 710/08/2023, 15:45
230810-s7ekdagc4x 710/08/2023, 15:44
230810-s6nfwsee43 710/08/2023, 15:41
230810-s42whagb9y 728/04/2023, 11:09
230428-m88lysfe41 702/04/2023, 13:37
230402-qwvfcahh4v 7Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2023, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
debug.keystore
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
debug.keystore
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
highlight-init.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
highlight-init.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
highlight.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
highlight.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
jquery-3.1.1.min.js
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
jquery-3.1.1.min.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
mathjax-config.js
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
mathjax-config.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
my-script.js
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
my-script.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
tooltipster-init.js
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
tooltipster-init.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
tooltipster.bundle.min.css
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
tooltipster.bundle.min.css
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
tooltipster.bundle.min.js
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
tooltipster.bundle.min.js
Resource
win10v2004-20230703-en
General
-
Target
tooltipster.bundle.min.css
-
Size
6KB
-
MD5
0213a269e84c94f18378712fa1aebd2f
-
SHA1
c602041adde9c8e618d944f96cc4e5ff9ff414e9
-
SHA256
1db93c9b2b6e416c611e6d66cd018e2fd23980f8c520143e21800512da8604f9
-
SHA512
e1f1c5af10007635f5c7f62cff1b8b1e668dc239925e03be7e4b5a90a0d483a579844d052878aef13be687ac7b743fedb9907eb7f22053204ce69e5e51e67b72
-
SSDEEP
48:54hhD/R5uj4ib5iet6hN3gN6ro8poDopJioeSJt482R8VbogEyn2tinQ4CPJP7mS:54rRI4iVhsgN6EGpJJZR2RcsR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1748 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1748 3036 cmd.exe 83 PID 3036 wrote to memory of 1748 3036 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\tooltipster.bundle.min.css1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\tooltipster.bundle.min.css2⤵
- Opens file in notepad (likely ransom note)
PID:1748
-