Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Arm Max_�...�).apk
android-9-x86
5Arm Max_�...�).apk
android-10-x64
1Arm Max_�...�).apk
android-11-x64
1debug.keystore
windows7-x64
3debug.keystore
windows10-2004-x64
3highlight-init.js
windows7-x64
1highlight-init.js
windows10-2004-x64
1highlight.js
windows7-x64
1highlight.js
windows10-2004-x64
1jquery-3.1.1.min.js
windows7-x64
1jquery-3.1.1.min.js
windows10-2004-x64
1mathjax-config.js
windows7-x64
1mathjax-config.js
windows10-2004-x64
1my-script.js
windows7-x64
1my-script.js
windows10-2004-x64
1tooltipster-init.js
windows7-x64
1tooltipster-init.js
windows10-2004-x64
1tooltipste...in.css
windows7-x64
3tooltipste...in.css
windows10-2004-x64
3tooltipste...min.js
windows7-x64
1tooltipste...min.js
windows10-2004-x64
1Resubmissions
10/08/2023, 16:05
230810-tjfyzage7s 710/08/2023, 15:55
230810-tc5czsgd6t 710/08/2023, 15:45
230810-s7ekdagc4x 710/08/2023, 15:44
230810-s6nfwsee43 710/08/2023, 15:41
230810-s42whagb9y 728/04/2023, 11:09
230428-m88lysfe41 702/04/2023, 13:37
230402-qwvfcahh4v 7Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
10/08/2023, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
Arm Max_网络验证 (免费).apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
debug.keystore
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
debug.keystore
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
highlight-init.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
highlight-init.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
highlight.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
highlight.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
jquery-3.1.1.min.js
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
jquery-3.1.1.min.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
mathjax-config.js
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
mathjax-config.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
my-script.js
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
my-script.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
tooltipster-init.js
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
tooltipster-init.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
tooltipster.bundle.min.css
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
tooltipster.bundle.min.css
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
tooltipster.bundle.min.js
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
tooltipster.bundle.min.js
Resource
win10v2004-20230703-en
General
-
Target
debug.keystore
-
Size
1KB
-
MD5
1a3f439e417094c08f1e6ba11259c6b0
-
SHA1
d06fcd36029fb77340471010af2bedbb9e498f2f
-
SHA256
1850ad18872d07ad3525b2754e73e53e89d3681c1801e8d1cd72ad4755f78429
-
SHA512
28aefc2d566489f0c4e4a8dcac64e50c8efe32cc1e8837ccf987512891f78f423a0545d349f0fb716ba2c3e9d4d1a472f7804ad6853f9ffe45ab6a55b97886e2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.keystore\ = "keystore_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\keystore_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\keystore_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\keystore_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\keystore_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\keystore_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.keystore rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\keystore_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1832 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1832 AcroRd32.exe 1832 AcroRd32.exe 1832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1948 2556 cmd.exe 29 PID 2556 wrote to memory of 1948 2556 cmd.exe 29 PID 2556 wrote to memory of 1948 2556 cmd.exe 29 PID 1948 wrote to memory of 1832 1948 rundll32.exe 30 PID 1948 wrote to memory of 1832 1948 rundll32.exe 30 PID 1948 wrote to memory of 1832 1948 rundll32.exe 30 PID 1948 wrote to memory of 1832 1948 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\debug.keystore1⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\debug.keystore2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\debug.keystore"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD525f24a10b3644d1efcacd292cd384869
SHA12e0387b68811ad80403f7f65b8520b6dcd62b5cf
SHA256d2211f097981a670839142e22e7c0ae6c77f735044646315e7f4a76d967c9404
SHA512e8c6cfe2086ba764d66bd76f4115c2f6d949e327a44bf51fe941fa7f3e9038db4b2d9f00e8a99de34d3447cbbaac55a40b7493b5fec3c2f21b86a8caee730df3