Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Revenge Launcher.xar
windows7-x64
3Revenge Launcher.xar
windows10-2004-x64
3Bom
windows7-x64
1Bom
windows10-2004-x64
1PackageInfo.xml
windows7-x64
1PackageInfo.xml
windows10-2004-x64
1Payload.gz
windows7-x64
3Payload.gz
windows10-2004-x64
7Payload
windows7-x64
1Payload
windows10-2004-x64
1Scripts.gz
windows7-x64
3Scripts.gz
windows10-2004-x64
7Scripts
windows7-x64
1Scripts
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
Revenge Launcher.xar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Revenge Launcher.xar
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Bom
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Bom
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
PackageInfo.xml
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
PackageInfo.xml
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Payload.gz
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Payload.gz
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Payload
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Payload
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Scripts.gz
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Scripts.gz
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Scripts
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Scripts
Resource
win10v2004-20231222-en
General
-
Target
Scripts.gz
-
Size
286B
-
MD5
17d697242242d12d5d00f5004406acd8
-
SHA1
82b470b466da67fdea7ef71a0aeaad0a4be6fdf1
-
SHA256
19902caa2fa9071f232c7cec6082de8dea461e5199fdf2b87f8be0320dd17ac2
-
SHA512
a3058a77f47bde22393dc20ab1be018ba477e428e17d089c25a9650cfec590feaf772ba8064b05c4c13bd10461d27fe6864b050ec62f74c847ec8bda55bac6f4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.gz rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\gz_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\gz_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\gz_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.gz\ = "gz_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\gz_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\gz_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\gz_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2624 AcroRd32.exe 2624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2092 2032 cmd.exe 29 PID 2032 wrote to memory of 2092 2032 cmd.exe 29 PID 2032 wrote to memory of 2092 2032 cmd.exe 29 PID 2092 wrote to memory of 2624 2092 rundll32.exe 30 PID 2092 wrote to memory of 2624 2092 rundll32.exe 30 PID 2092 wrote to memory of 2624 2092 rundll32.exe 30 PID 2092 wrote to memory of 2624 2092 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Scripts.gz1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Scripts.gz2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Scripts.gz"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5db82ce48cf511f0948865b5d26658b39
SHA1c1625d6cdeda907a3b57083c8cd9d670e5ae30f4
SHA2565e60f5b51d61de534bfdb9f8269690ddf104667ab27a822b9f2183dc17669531
SHA512aa5f9499ffa7899c5fee604f7ade6b1e5ae12b6fec44e4e942079d301dfadfa18d4c3f28a7d89bcf047854b93455617676bddea1b1b5380d9a93579468b50482