Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17/08/2023, 23:04
Behavioral task
behavioral1
Sample
ShadowGen.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ShadowGen.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
shadowgen.pyc
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
shadowgen.pyc
Resource
win10v2004-20230703-en
General
-
Target
shadowgen.pyc
-
Size
1KB
-
MD5
c1eada488b7e9b877345a169dddd5718
-
SHA1
d23e8f00cb92a813e7a9fefb8ef85c4cf5d1f1df
-
SHA256
f70687f65e2ea74f5f1ccbbb5a229ba8d75d7f6dd2d5056e1c62e2961a1c6e8f
-
SHA512
481b4a4965ee0b6a92aad7717dbe784d220adc2c26babaed1b22ee64b42d79f4949919432e644bbca16e24c2cc38a96a6ca095984707b1da6600b22b68bf1b5a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2460 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2460 AcroRd32.exe 2460 AcroRd32.exe 2460 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2552 wrote to memory of 296 2552 cmd.exe 29 PID 2552 wrote to memory of 296 2552 cmd.exe 29 PID 2552 wrote to memory of 296 2552 cmd.exe 29 PID 296 wrote to memory of 2460 296 rundll32.exe 30 PID 296 wrote to memory of 2460 296 rundll32.exe 30 PID 296 wrote to memory of 2460 296 rundll32.exe 30 PID 296 wrote to memory of 2460 296 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\shadowgen.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\shadowgen.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\shadowgen.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f47483c919c0a68df9c3c4467ef4da24
SHA1280821526142bfe83fae471cdd4a43d3bfda55e0
SHA256c2e08d4a5f9b3239342ec73ebf61b9be614a144493f6c8390c9246ad566c2333
SHA5128c63e4b353960c35435271314703628f1476e9e47b62723275d187865c91b42a863c20eb1a265e629a4b8da40179ccd22f6caab8d3de2a91de1958d225992ff5