Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
8ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
10Adobe.exe
windows7-x64
8Adobe.exe
windows10-2004-x64
10CGserver.exe
windows7-x64
10CGserver.exe
windows10-2004-x64
10COON.exe
windows7-x64
10COON.exe
windows10-2004-x64
8FFA.exe
windows7-x64
10FFA.exe
windows10-2004-x64
8FIle Rustyz bot.exe
windows7-x64
8FIle Rustyz bot.exe
windows10-2004-x64
8FrostBot v1.exe
windows7-x64
10FrostBot v1.exe
windows10-2004-x64
10Google.exe
windows7-x64
10Google.exe
windows10-2004-x64
10MORPH_9359...79.exe
windows7-x64
3MORPH_9359...79.exe
windows10-2004-x64
3Mycrypt.exe
windows7-x64
8Mycrypt.exe
windows10-2004-x64
10PortChecker.exe
windows7-x64
8PortChecker.exe
windows10-2004-x64
10R.exe
windows7-x64
10R.exe
windows10-2004-x64
10RSBOT.exe
windows7-x64
RSBOT.exe
windows10-2004-x64
Rustyz.exe
windows7-x64
8Rustyz.exe
windows10-2004-x64
10Rustyzzbot.exe
windows7-x64
8Rustyzzbot.exe
windows10-2004-x64
1Analysis
-
max time kernel
4s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 07:05
Behavioral task
behavioral1
Sample
ABO.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ABO.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Adobe.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Adobe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
CGserver.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
CGserver.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
COON.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
COON.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
FFA.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
FFA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
FIle Rustyz bot.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
FIle Rustyz bot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
FrostBot v1.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FrostBot v1.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Google.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Google.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
MORPH_93594C2E8879.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
MORPH_93594C2E8879.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
Mycrypt.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Mycrypt.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
PortChecker.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
PortChecker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
R.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
R.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
RSBOT.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
RSBOT.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Rustyz.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Rustyz.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Rustyzzbot.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
Rustyzzbot.exe
Resource
win10v2004-20231222-en
General
-
Target
Mycrypt.exe
-
Size
228KB
-
MD5
a35e683f7392d7aa6be1ac5d325a0584
-
SHA1
7b2a3dfd0579ec4a9f61e45994a48881ebb91b49
-
SHA256
85fac218aabc9a6d08380d6f4fbe07818c5f7c8dc1f630bb849ab5681c83d7de
-
SHA512
7c94c1f19f793d7efe251d9c0c4df900a10b8b85a36da9c883fce2b511f5f65d107d09be777efa92a3be6c0bdd38c302acd024ee48cf836889f79dfabb069470
-
SSDEEP
3072:R26et7TW3+lXSittze7GjsZCc8dexm1qX2Gqfkz297vslPCTjUB9LQdItu:R2BTW6ji7ZCc8dMOqX2Gb29AlPn9Mx
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2892 netsh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 1720 2384 Mycrypt.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 Mycrypt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28 PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28 PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28 PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28 PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28 PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28 PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28 PID 2384 wrote to memory of 1720 2384 Mycrypt.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\lsass.exe" CityScape Enable3⤵
- Modifies Windows Firewall
PID:2892
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe/d C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe3⤵PID:2880
-
C:\Users\Admin\AppData\Roaming\lsass.exeC:\Users\Admin\AppData\Roaming\lsass.exe /d C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe4⤵PID:1976
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
92KB
MD571e4ce8b3a1b89f335a6936bbdafce4c
SHA16e0d450eb5f316a9924b3e58445b26bfb727001e
SHA256a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5
SHA512b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7
-
Filesize
8KB
MD5e094ffac2dafa62cd9b77f4cf58dff8c
SHA1045fe7943c5574f92cf21436780db8685bda3312
SHA256b05e2f4aeb13aab1c0d713571bc5a5ccca7c8d04c64e7d8cad7fb86e709c9eeb
SHA512e0aa8324d2b3290c4622e7e192762adc1085d03654155875244495f7da265260b0af53b95344d5dfd050d978b449397313bd98dedc30d18f0f3aa01f6dee75a0
-
Filesize
4KB
MD57f13a8e8b656f282cda570ce51daf6a2
SHA16ea8c206fdf8ad16b9aeba14a55a2d34a900aa3c
SHA256236115e4dacc1a335e3ff6cab0b50605e7abf2be8db8eef7f2fd638036db0375
SHA512d8ef706260e0e8c0a88366ffdb5c4a43458e0e975e3ee111e30650fa43ae4a8880208f123fbae76545d25f9f316cf689dd52c80d5c299b8556c7e82062f5c82d
-
Filesize
32KB
MD58e84acf5cd74a8d508472bfe2f15fab8
SHA1ab561f11dab9bc3ddc372beccef2d036bdf92cc5
SHA25686433b5814fc1c5c7e805573637d30eb73c95e8a5c6c4072630ed7c9fd833d2d
SHA5122c1243e7f9080366da9c693e2f5cbf80c86ae9becedcb0bf7d3c9877de1ad43eea1146654b9af4a273f4297970ef4769b07478b38c7ccdea0c812ce391d48aad
-
Filesize
16KB
MD503c0f46dc6869cc87005dc27b2f23e4c
SHA17de7c5e3e4591fa39593dc2328c20538b5af662a
SHA2564bcb0843d74dea62618306be840e28df1c6763e00c851a70967d6b03c075b5a2
SHA512cc72ae021c5d7fbc1d1f50c6bbefed574506f9658747b88b69f49b6d49268a67701436ca2b724611e8fa7736b943151641aa40565a703352624f8589a7128fd8
-
Filesize
14KB
MD5a22d8e967f20982530b55ab0b8527c8a
SHA13373ab9a0406f68b1feddcc25675a6dff4bb4668
SHA25657148812c1fb27fe5322acc41429472714c5b6ec894d9f719eaede245a987b5b
SHA5128867a687badcb9f6f2ea7e2b679d86aa737fd336b699afa7ec80d745d609783f331bf627f25aaa7027396d03647264fae71b5a537fa5b289e852a6c4b68d4fda