Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Arm Max_�...�).apk
android-9-x86
5Arm Max_�...�).apk
android-10-x64
1Arm Max_�...�).apk
android-11-x64
1debug.keystore
windows7-x64
3debug.keystore
windows10-2004-x64
3highlight-init.js
windows7-x64
1highlight-init.js
windows10-2004-x64
1highlight.js
windows7-x64
1highlight.js
windows10-2004-x64
1jquery-3.1.1.min.js
windows7-x64
1jquery-3.1.1.min.js
windows10-2004-x64
1mathjax-config.js
windows7-x64
1mathjax-config.js
windows10-2004-x64
1my-script.js
windows7-x64
1my-script.js
windows10-2004-x64
1tooltipster-init.js
windows7-x64
1tooltipster-init.js
windows10-2004-x64
1tooltipste...in.css
windows7-x64
3tooltipste...in.css
windows10-2004-x64
3tooltipste...min.js
windows7-x64
1tooltipste...min.js
windows10-2004-x64
1Resubmissions
10/08/2023, 16:05
230810-tjfyzage7s 710/08/2023, 15:55
230810-tc5czsgd6t 710/08/2023, 15:45
230810-s7ekdagc4x 710/08/2023, 15:44
230810-s6nfwsee43 710/08/2023, 15:41
230810-s42whagb9y 728/04/2023, 11:09
230428-m88lysfe41 702/04/2023, 13:37
230402-qwvfcahh4v 7Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
10/08/2023, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
debug.keystore
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
debug.keystore
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
highlight-init.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
highlight-init.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
highlight.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
highlight.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
jquery-3.1.1.min.js
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
jquery-3.1.1.min.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
mathjax-config.js
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
mathjax-config.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
my-script.js
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
my-script.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
tooltipster-init.js
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
tooltipster-init.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
tooltipster.bundle.min.css
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
tooltipster.bundle.min.css
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
tooltipster.bundle.min.js
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
tooltipster.bundle.min.js
Resource
win10v2004-20230703-en
General
-
Target
debug.keystore
-
Size
1KB
-
MD5
1a3f439e417094c08f1e6ba11259c6b0
-
SHA1
d06fcd36029fb77340471010af2bedbb9e498f2f
-
SHA256
1850ad18872d07ad3525b2754e73e53e89d3681c1801e8d1cd72ad4755f78429
-
SHA512
28aefc2d566489f0c4e4a8dcac64e50c8efe32cc1e8837ccf987512891f78f423a0545d349f0fb716ba2c3e9d4d1a472f7804ad6853f9ffe45ab6a55b97886e2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.keystore rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\keystore_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\keystore_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\keystore_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\keystore_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.keystore\ = "keystore_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\keystore_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\keystore_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2776 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2776 AcroRd32.exe 2776 AcroRd32.exe 2776 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2780 2616 cmd.exe 29 PID 2616 wrote to memory of 2780 2616 cmd.exe 29 PID 2616 wrote to memory of 2780 2616 cmd.exe 29 PID 2780 wrote to memory of 2776 2780 rundll32.exe 30 PID 2780 wrote to memory of 2776 2780 rundll32.exe 30 PID 2780 wrote to memory of 2776 2780 rundll32.exe 30 PID 2780 wrote to memory of 2776 2780 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\debug.keystore1⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\debug.keystore2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\debug.keystore"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5272ace44bee5bc4395d4c18743a74268
SHA1c80bd19292edf806fd422ec0208855edc717e2ba
SHA256940961391d8ed8c95f81dfa12a797d2bcf06f0ff39a0d805cdbb6f060936c327
SHA512064743e5611c35a0419aa17429bb5c7de48e26614bb1982bd92dbb4b82312c78938e65ef405bbe2242e0fed5bdc37728cf68ce25fb6554b7f95a2cb791bc190e