Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3whirlpool.zip
windows7-x64
1whirlpool.zip
windows10-2004-x64
1whirlpool/...er.pdf
windows7-x64
1whirlpool/...er.pdf
windows10-2004-x64
1whirlpool/...er.tex
windows7-x64
3whirlpool/...er.tex
windows10-2004-x64
3whirlpool/...ol.pdf
windows7-x64
1whirlpool/...ol.pdf
windows10-2004-x64
1whirlpool/...rs.txt
windows7-x64
1whirlpool/...rs.txt
windows10-2004-x64
1whirlpool/...nt.pdf
windows7-x64
1whirlpool/...nt.pdf
windows10-2004-x64
1whirlpool/...nt.tex
windows7-x64
3whirlpool/...nt.tex
windows10-2004-x64
3Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 18:09
Behavioral task
behavioral1
Sample
whirlpool.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
whirlpool.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
whirlpool/A/Whirlpool-cover.pdf
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
whirlpool/A/Whirlpool-cover.pdf
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
whirlpool/A/Whirlpool-cover.tex
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
whirlpool/A/Whirlpool-cover.tex
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
whirlpool/B/Whirlpool.pdf
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
whirlpool/B/Whirlpool.pdf
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
whirlpool/C/whirlpool-test-vectors.txt
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
whirlpool/C/whirlpool-test-vectors.txt
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
whirlpool/D/Whirlpool-ip-statement.pdf
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
whirlpool/D/Whirlpool-ip-statement.pdf
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
whirlpool/D/Whirlpool-ip-statement.tex
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
whirlpool/D/Whirlpool-ip-statement.tex
Resource
win10v2004-20230703-en
General
-
Target
whirlpool/A/Whirlpool-cover.tex
-
Size
1KB
-
MD5
a4ebf724451d64c6ee15c04bd187bcfe
-
SHA1
9ad2d39e1cc62e3c0337769b4d6b2eefc386f951
-
SHA256
cd24e2c3e527c8fb9124dd174cd99ddaa862f9de5563fc529694a25c6d76afc8
-
SHA512
ac2f21ed8139e24ad592da2914ced5f7da686182e7dc7313bdb9d3481a842842c94f5b9c80b2fe6467b6f78d3f538208f32e28335edec849d851221245e4fdd2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.tex rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.tex\ = "tex_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\tex_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2860 AcroRd32.exe 2860 AcroRd32.exe 2860 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2840 1320 cmd.exe 29 PID 1320 wrote to memory of 2840 1320 cmd.exe 29 PID 1320 wrote to memory of 2840 1320 cmd.exe 29 PID 2840 wrote to memory of 2860 2840 rundll32.exe 30 PID 2840 wrote to memory of 2860 2840 rundll32.exe 30 PID 2840 wrote to memory of 2860 2840 rundll32.exe 30 PID 2840 wrote to memory of 2860 2840 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\whirlpool\A\Whirlpool-cover.tex1⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\whirlpool\A\Whirlpool-cover.tex2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\whirlpool\A\Whirlpool-cover.tex"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c0f578219b1fe99eaa1b8140260a10f4
SHA17abf6736918aec8fea446d9724f86020aa025db3
SHA25694ae4e7090c6cb129acf7d7945c42cf5cbe05575f9d4d424defaa760257f71fd
SHA51239fcfc8844c5d6afceff8ef335d34254bbdebf331f4a66005b4a5f77ff8e83b7a81d160408b7263db4207286add7a528ef261a21f90b64d851bcd82d1d6d45e4