Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Revenge Launcher.xar
windows7-x64
3Revenge Launcher.xar
windows10-2004-x64
3Bom
windows7-x64
1Bom
windows10-2004-x64
1PackageInfo.xml
windows7-x64
1PackageInfo.xml
windows10-2004-x64
1Payload.gz
windows7-x64
3Payload.gz
windows10-2004-x64
7Payload
windows7-x64
1Payload
windows10-2004-x64
1Scripts.gz
windows7-x64
3Scripts.gz
windows10-2004-x64
7Scripts
windows7-x64
1Scripts
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
Revenge Launcher.xar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Revenge Launcher.xar
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Bom
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Bom
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
PackageInfo.xml
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
PackageInfo.xml
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Payload.gz
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Payload.gz
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Payload
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Payload
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Scripts.gz
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Scripts.gz
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Scripts
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Scripts
Resource
win10v2004-20231222-en
General
-
Target
Payload.gz
-
Size
50.6MB
-
MD5
6a5c5e36742e234640484a1c4eb30037
-
SHA1
48baf4e37fadedfc4c92168dd1ee548fa8523a96
-
SHA256
9b81ca128699d2dce86743c13e08c4492b7ec8eda994fcb73eac1e76a6c3ae9f
-
SHA512
9eaa4eba53c44108faf457f5bf58c0496547f0d3695070e9f2958ab6f729ef4e4a3483eb97460cd0f68f55082c0a691459df8ae234663e49a47ea366107b6ce3
-
SSDEEP
1572864:4MLUZrNdn4ihGLQQg7JJvriPwrrzfl2aTdf:FWrJoMQCJxGPwr/bTV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2720 7zFM.exe Token: 35 2720 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2720 2988 cmd.exe 29 PID 2988 wrote to memory of 2720 2988 cmd.exe 29 PID 2988 wrote to memory of 2720 2988 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Payload.gz1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Payload.gz"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2720
-