Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3whirlpool.zip
windows7-x64
1whirlpool.zip
windows10-2004-x64
1whirlpool/...er.pdf
windows7-x64
1whirlpool/...er.pdf
windows10-2004-x64
1whirlpool/...er.tex
windows7-x64
3whirlpool/...er.tex
windows10-2004-x64
3whirlpool/...ol.pdf
windows7-x64
1whirlpool/...ol.pdf
windows10-2004-x64
1whirlpool/...rs.txt
windows7-x64
1whirlpool/...rs.txt
windows10-2004-x64
1whirlpool/...nt.pdf
windows7-x64
1whirlpool/...nt.pdf
windows10-2004-x64
1whirlpool/...nt.tex
windows7-x64
3whirlpool/...nt.tex
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 18:09
Behavioral task
behavioral1
Sample
whirlpool.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
whirlpool.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
whirlpool/A/Whirlpool-cover.pdf
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
whirlpool/A/Whirlpool-cover.pdf
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
whirlpool/A/Whirlpool-cover.tex
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
whirlpool/A/Whirlpool-cover.tex
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
whirlpool/B/Whirlpool.pdf
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
whirlpool/B/Whirlpool.pdf
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
whirlpool/C/whirlpool-test-vectors.txt
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
whirlpool/C/whirlpool-test-vectors.txt
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
whirlpool/D/Whirlpool-ip-statement.pdf
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
whirlpool/D/Whirlpool-ip-statement.pdf
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
whirlpool/D/Whirlpool-ip-statement.tex
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
whirlpool/D/Whirlpool-ip-statement.tex
Resource
win10v2004-20230703-en
General
-
Target
whirlpool/D/Whirlpool-ip-statement.tex
-
Size
2KB
-
MD5
646669335c7d4d80b7cfd4fdc83e4833
-
SHA1
f6794e60297a01f8459d17ed4bf51f5e939b532a
-
SHA256
0e82633fd35a023b59a6c00d7facba37c8a7a10336454eb731970eef689400e1
-
SHA512
7b67abe26ef6cfacc035460f33cc21c48fe7efe2185e8b517ae8be1b72461ce50b91b8952dcef4bbaac5dc4ca1446545d7debcb131f59f5da46525cf45e625a3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.tex rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.tex\ = "tex_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1992 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1992 AcroRd32.exe 1992 AcroRd32.exe 1992 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2668 2336 cmd.exe 29 PID 2336 wrote to memory of 2668 2336 cmd.exe 29 PID 2336 wrote to memory of 2668 2336 cmd.exe 29 PID 2668 wrote to memory of 1992 2668 rundll32.exe 30 PID 2668 wrote to memory of 1992 2668 rundll32.exe 30 PID 2668 wrote to memory of 1992 2668 rundll32.exe 30 PID 2668 wrote to memory of 1992 2668 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\whirlpool\D\Whirlpool-ip-statement.tex1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\whirlpool\D\Whirlpool-ip-statement.tex2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\whirlpool\D\Whirlpool-ip-statement.tex"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a48e67bc0613d2f122232b25708c10f9
SHA1cf312cc749309bcdb7707fe98234d23a800798cf
SHA2561ef9c243e522c562274962537e0f7700cca97928d9520f924befafb1cb9501f2
SHA51219c19985c2dba11f1264ea599726ee6b90f1e6acc3e80f91b897f0a12d243b79d1de869318f3adf31a76f6f9421b79872801f83be1b736d73120e0d670a1cc8b