Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/08/2023, 02:18
230822-crmytabb7y 822/08/2023, 02:17
230822-cqynxshe49 1022/08/2023, 02:12
230822-cm1n4sbb5t 8Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
v4cracked.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral2
Sample
v4cracked/patcher.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
v4cracked/readme.txt
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
v4cracked/v4cracked by trigga8694.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
loader-o.pyc
Resource
win10v2004-20230703-en
General
-
Target
loader-o.pyc
-
Size
1KB
-
MD5
c9da2cbea39364be30f4c2a439b7d6a3
-
SHA1
2e56a3c54cdf3a58d73def179eb48476ed0795ea
-
SHA256
97009a2c5efcb875d9ec69cfe5cb7bea1b11595e2791c0a1cfb0dc35c1466503
-
SHA512
40478ec9eff6c8d3fc4bace432d420978cb6bf466b31845f8e50f825efc74eae7737ca8abba51162d92ad2d83b43184779e85eb086b466f8fb5f226b47f5102c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4112 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe 4112 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4112 wrote to memory of 3964 4112 OpenWith.exe 92 PID 4112 wrote to memory of 3964 4112 OpenWith.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\loader-o.pyc1⤵
- Modifies registry class
PID:4108
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\loader-o.pyc2⤵PID:3964
-