Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
8ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
10Adobe.exe
windows7-x64
8Adobe.exe
windows10-2004-x64
10CGserver.exe
windows7-x64
10CGserver.exe
windows10-2004-x64
10COON.exe
windows7-x64
10COON.exe
windows10-2004-x64
8FFA.exe
windows7-x64
10FFA.exe
windows10-2004-x64
8FIle Rustyz bot.exe
windows7-x64
8FIle Rustyz bot.exe
windows10-2004-x64
8FrostBot v1.exe
windows7-x64
10FrostBot v1.exe
windows10-2004-x64
10Google.exe
windows7-x64
10Google.exe
windows10-2004-x64
10MORPH_9359...79.exe
windows7-x64
3MORPH_9359...79.exe
windows10-2004-x64
3Mycrypt.exe
windows7-x64
8Mycrypt.exe
windows10-2004-x64
10PortChecker.exe
windows7-x64
8PortChecker.exe
windows10-2004-x64
10R.exe
windows7-x64
10R.exe
windows10-2004-x64
10RSBOT.exe
windows7-x64
RSBOT.exe
windows10-2004-x64
Rustyz.exe
windows7-x64
8Rustyz.exe
windows10-2004-x64
10Rustyzzbot.exe
windows7-x64
8Rustyzzbot.exe
windows10-2004-x64
1Analysis
-
max time kernel
4s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 07:05
Behavioral task
behavioral1
Sample
ABO.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ABO.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Adobe.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Adobe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
CGserver.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
CGserver.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
COON.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
COON.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
FFA.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
FFA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
FIle Rustyz bot.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
FIle Rustyz bot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
FrostBot v1.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FrostBot v1.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Google.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Google.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
MORPH_93594C2E8879.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
MORPH_93594C2E8879.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
Mycrypt.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Mycrypt.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
PortChecker.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
PortChecker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
R.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
R.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
RSBOT.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
RSBOT.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Rustyz.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Rustyz.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Rustyzzbot.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
Rustyzzbot.exe
Resource
win10v2004-20231222-en
General
-
Target
Rustyz.exe
-
Size
120KB
-
MD5
72bcd7f24413629f6b194c718af7b39e
-
SHA1
8495ab957722ea594b4a45a8a7522b9a24d23988
-
SHA256
43a8ced5b270b43b025b166f5069446de5c15479dcb049034f7db073153ebce4
-
SHA512
d5c9f01857e20fef93a8dc2e854bd3d18cf4c8d712eb6bf416f740c2e17eb14d9afa7eb9afb9241261bbfb07ab066447f6b22c9f78b815416d392329265a5213
-
SSDEEP
1536:94WHOJOV+P1tMZw1pSqvarF8TfHlo6nu/dhIo7RkSQAVE4Zks:94nzHn1nHllnu/co7aGV3Zks
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2916 netsh.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2284 Rustyz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rustyz.exe"C:\Users\Admin\AppData\Local\Temp\Rustyz.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Users\Admin\AppData\Roaming\services.exe/d C:\Users\Admin\AppData\Local\Temp\Rustyz.exe2⤵PID:2912
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\services.exe" CityScape Enable2⤵
- Modifies Windows Firewall
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5a60035dddb47cd584658f14ec24273be
SHA11ad94a46c78e9f95bc001a9d69c8575e682ab6a3
SHA2564139aa80337c46838ddf6239907b65a7bb6d29d6d4e9e000a4f17374db9b34d9
SHA5123e53077dea12dc70e608e57d789afe72eb2262b0db243e496bf3cc7be2262ad2808a0c05d2fc4796bccd2f40b3533397a9d272702e1c8c76f29d3643f069f005