Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
grab.py
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
grab.py
Resource
win10v2004-20231215-en
General
-
Target
grab.py
-
Size
4KB
-
MD5
4eb9754bc9017b833c690c04a65b9ec1
-
SHA1
1c639b9d5ee315c186f6b720eea2d4bf728d1115
-
SHA256
fd89181f245e67427bac98bc7eb7f212f45b5eda735ec5bdb21e293e62da5f9c
-
SHA512
77f2bc4b770e62a8bb4292f5ca76b4d7a52ed15e0f0dc2969b58532241ccd1fb9e79457e0d8e0793d575b71c2243c36b7e271cddab87a6ef3313706cfdfe3b4c
-
SSDEEP
96:UukNoEZrmYRrAGuIfIqxEVah/47/LYf5XKTa+pLVwswEyj1u:QZrmYRrAGuIfIqxh47SoKswEyjg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3012 1684 cmd.exe 29 PID 1684 wrote to memory of 3012 1684 cmd.exe 29 PID 1684 wrote to memory of 3012 1684 cmd.exe 29 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30 PID 3012 wrote to memory of 2644 3012 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\grab.py1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\grab.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\grab.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD588c1c18d3b85910ea0b6453f59f4fd6b
SHA195d79b58c9eb863cb470efc5d13002ced167c583
SHA256847a0d28e453e818296bbcbbd23ac3aba84efaf4472543af878b6687e4bd6689
SHA5121a50129c35c4340caa6340f5d1d5a02dfffc8a1e9b6be465608744a9996bc8d1e48a88a020084b6b6c519378dd9f9239551397bccab10e919359d7a343d24f84