Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10DDos-Tool-...er.exe
windows7-x64
7DDos-Tool-...er.exe
windows10-2004-x64
7DDos-Tool-...ol.exe
windows7-x64
7DDos-Tool-...ol.exe
windows10-2004-x64
7DDos-Tool-...tes.py
windows7-x64
3DDos-Tool-...tes.py
windows10-2004-x64
3DDos-Tool-main/gui.py
windows7-x64
3DDos-Tool-main/gui.py
windows10-2004-x64
3Analysis
-
max time kernel
175s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 01:41
Behavioral task
behavioral1
Sample
DDos-Tool-main/DarkDoser.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
DDos-Tool-main/DarkDoser.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
DDos-Tool-main/Ddos tool.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
DDos-Tool-main/Ddos tool.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
DDos-Tool-main/Extras/unblock_sites.py
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
DDos-Tool-main/Extras/unblock_sites.py
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
DDos-Tool-main/gui.py
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
DDos-Tool-main/gui.py
Resource
win10v2004-20230915-en
General
-
Target
DDos-Tool-main/Extras/unblock_sites.py
-
Size
1KB
-
MD5
0d1019573b112545f9fd41a4e0acc342
-
SHA1
6ab1685e4d4aa3d16307325da3c8c6a65cc1cd2a
-
SHA256
bf5c32f73990a16835b5b91f08647617dce973a68626ee4921bc5e2c5a07cafe
-
SHA512
d4cdb37acabfe9013aa8cdec6cce9040a9d9c2b52570fa45f1a0750c29860b161d0446ded2d3f31c61676f42ab2be7c01c8cffc09ae64126510ee2d484e1c561
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3028 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2244 2744 cmd.exe 30 PID 2744 wrote to memory of 2244 2744 cmd.exe 30 PID 2744 wrote to memory of 2244 2744 cmd.exe 30 PID 2244 wrote to memory of 3028 2244 rundll32.exe 32 PID 2244 wrote to memory of 3028 2244 rundll32.exe 32 PID 2244 wrote to memory of 3028 2244 rundll32.exe 32 PID 2244 wrote to memory of 3028 2244 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DDos-Tool-main\Extras\unblock_sites.py1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DDos-Tool-main\Extras\unblock_sites.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DDos-Tool-main\Extras\unblock_sites.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50b070df8428ec190733449b907493b7e
SHA1ba8e8cef73e85a57c05baf0e0bcb5c0a43719037
SHA256aaf8d3590c5344937801ee1912cd942911831a660edb3dc8cc279fba6744bed9
SHA512779dd58f1c65b4d24163af0389e89f06b95ff208fd2157d9521dda812a731508a915c3328e51dd1752a9a6a09c7be3f56a0d454873ed43d2264a19c95321bc46