Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
74dc9876dab...c1.apk
android-9-x86
7frag.sh
windows7-x64
3frag.sh
windows10-2004-x64
3index.umd.js
windows7-x64
1index.umd.js
windows10-2004-x64
1libwbsafeedit
debian-9-armhf
1libwbsafeedit_64
ubuntu-18.04-amd64
libwbsafeedit_64
debian-9-armhf
libwbsafeedit_64
debian-9-mips
libwbsafeedit_64
debian-9-mipsel
libwbsafeedit_x86
ubuntu-18.04-amd64
1libwbsafeedit_x86_64
ubuntu-18.04-amd64
1platformProtocol.html
windows7-x64
1platformProtocol.html
windows10-2004-x64
1popup.html
windows7-x64
1popup.html
windows10-2004-x64
1userProtocol.html
windows7-x64
1userProtocol.html
windows10-2004-x64
1vertex.sh
windows7-x64
3vertex.sh
windows10-2004-x64
3windmill.worker.js
windows7-x64
1windmill.worker.js
windows10-2004-x64
1Analysis
-
max time kernel
207s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
4dc9876dab47be50c138a4dd4248cbfae9f595ba70965d5efdede99c21721ec1.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
frag.sh
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
frag.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
index.umd.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
index.umd.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
libwbsafeedit
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
libwbsafeedit_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral8
Sample
libwbsafeedit_64
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral9
Sample
libwbsafeedit_64
Resource
debian9-mipsbe-20230831-en
Behavioral task
behavioral10
Sample
libwbsafeedit_64
Resource
debian9-mipsel-20230831-en
Behavioral task
behavioral11
Sample
libwbsafeedit_x86
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral12
Sample
libwbsafeedit_x86_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral13
Sample
platformProtocol.html
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
platformProtocol.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
popup.html
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
popup.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
userProtocol.html
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
userProtocol.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
vertex.sh
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
vertex.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
windmill.worker.js
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
windmill.worker.js
Resource
win10v2004-20230915-en
General
-
Target
vertex.sh
-
Size
1KB
-
MD5
8b1794b41fadf1bcadafba979d23b83e
-
SHA1
2b1d634d36316e86b60c68fde9a65856c47d0e57
-
SHA256
0a6c4b746128ed89c066cec16227deb7b56224bcfd65fe8aefbe9d1b8f21dfc3
-
SHA512
b26b18671b7f8d295486e59f158ae603b775113e96a7f65f50401d53af7093f6ce7308addaa613ee1d54e69b6668062432a9942cadf860a69c49db2f3b39c9ce
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2856 2364 cmd.exe 30 PID 2364 wrote to memory of 2856 2364 cmd.exe 30 PID 2364 wrote to memory of 2856 2364 cmd.exe 30 PID 2856 wrote to memory of 2644 2856 rundll32.exe 31 PID 2856 wrote to memory of 2644 2856 rundll32.exe 31 PID 2856 wrote to memory of 2644 2856 rundll32.exe 31 PID 2856 wrote to memory of 2644 2856 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\vertex.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\vertex.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\vertex.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD582e0d981cc64593016f11594762e5d9e
SHA1943b76c66c1efa484c87476c33970f81f5b6e2f9
SHA256f8ea6debc5d6b4406a162f14719ace60f1449e089f69e02de0fd03e242c589a2
SHA512fa12e73f7dbfa2545d77255d8f2f89da90603b165559fd13c0c61babb915cd40046c39a630bb943100393ea11495ba38b3d96d91ba7b095bb4220d53143ef499