Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3geode-inst...in.exe
windows7-x64
7geode-inst...in.exe
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7Geode.pdb
windows7-x64
3Geode.pdb
windows10-2004-x64
3geode/reso...hd.xml
windows7-x64
1geode/reso...hd.xml
windows10-2004-x64
1geode/reso...hd.png
windows7-x64
3geode/reso...hd.png
windows10-2004-x64
3geode/reso...hd.xml
windows7-x64
1geode/reso...hd.xml
windows10-2004-x64
1geode/reso...hd.png
windows7-x64
3geode/reso...hd.png
windows10-2004-x64
3geode/reso...et.xml
windows7-x64
1geode/reso...et.xml
windows10-2004-x64
1geode/reso...et.png
windows7-x64
3geode/reso...et.png
windows10-2004-x64
3geode/reso...hd.xml
windows7-x64
1geode/reso...hd.xml
windows10-2004-x64
1geode/reso...hd.png
windows7-x64
3geode/reso...hd.png
windows10-2004-x64
3geode/reso...hd.xml
windows7-x64
1geode/reso...hd.xml
windows10-2004-x64
1geode/reso...hd.png
windows7-x64
3geode/reso...hd.png
windows10-2004-x64
3geode/reso...et.xml
windows7-x64
1geode/reso...et.xml
windows10-2004-x64
1geode/reso...et.png
windows7-x64
3geode/reso...et.png
windows10-2004-x64
3geode/reso...hd.png
windows7-x64
3geode/reso...hd.png
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
geode-installer-v2.0.0-beta.17-win.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
geode-installer-v2.0.0-beta.17-win.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Geode.pdb
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Geode.pdb
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
geode/resources/geode.loader/APISheet-hd.xml
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
geode/resources/geode.loader/APISheet-hd.xml
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
geode/resources/geode.loader/APISheet-hd.png
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
geode/resources/geode.loader/APISheet-hd.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
geode/resources/geode.loader/APISheet-uhd.xml
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
geode/resources/geode.loader/APISheet-uhd.xml
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
geode/resources/geode.loader/APISheet-uhd.png
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
geode/resources/geode.loader/APISheet-uhd.png
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
geode/resources/geode.loader/APISheet.xml
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
geode/resources/geode.loader/APISheet.xml
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
geode/resources/geode.loader/APISheet.png
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
geode/resources/geode.loader/APISheet.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
geode/resources/geode.loader/BlankSheet-hd.xml
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
geode/resources/geode.loader/BlankSheet-hd.xml
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
geode/resources/geode.loader/BlankSheet-hd.png
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
geode/resources/geode.loader/BlankSheet-hd.png
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
geode/resources/geode.loader/BlankSheet-uhd.xml
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
geode/resources/geode.loader/BlankSheet-uhd.xml
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
geode/resources/geode.loader/BlankSheet-uhd.png
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
geode/resources/geode.loader/BlankSheet-uhd.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
geode/resources/geode.loader/BlankSheet.xml
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
geode/resources/geode.loader/BlankSheet.xml
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
geode/resources/geode.loader/BlankSheet.png
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
geode/resources/geode.loader/BlankSheet.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
geode/resources/geode.loader/GE_button_01-hd.png
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
geode/resources/geode.loader/GE_button_01-hd.png
Resource
win10v2004-20231215-en
General
-
Target
Geode.pdb
-
Size
36.5MB
-
MD5
3da0c10b996438a6de7e01c093b41b19
-
SHA1
9c069a25026a15971928a06d1a22ecfc5ab14191
-
SHA256
eb002b99f1467813462341538d5feb927be68e03075ad81ddf495611c2ce0123
-
SHA512
6c49130cc3c04d349a032f122c80b395a504af01a24c8398aa379f4b5b6aecc855bc1bed31a8d6d2093253543a986638eb34ea7e8f6898adddcdabafe6056997
-
SSDEEP
196608:O3NAz/vHuRqfdfTXVZ3O533dh3kyrgrYdh1495Hc:O3NAz/vHu0fdfBZ3S3X1rgrYdMm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pdb_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.pdb\ = "pdb_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pdb_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pdb_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pdb_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pdb_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.pdb rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pdb_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2648 AcroRd32.exe 2648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2856 1700 cmd.exe 29 PID 1700 wrote to memory of 2856 1700 cmd.exe 29 PID 1700 wrote to memory of 2856 1700 cmd.exe 29 PID 2856 wrote to memory of 2648 2856 rundll32.exe 30 PID 2856 wrote to memory of 2648 2856 rundll32.exe 30 PID 2856 wrote to memory of 2648 2856 rundll32.exe 30 PID 2856 wrote to memory of 2648 2856 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Geode.pdb1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Geode.pdb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Geode.pdb"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5474219a7ea351f3665a10e42cd7bc34a
SHA1aaf04691aaa4825f947e0978a364d8776c582039
SHA256dae3e31bf925c2f9b51bb75ec22b0341c645eccaf3c442637b8ff89d7002915f
SHA51294737152b88c1bd375ac3d9ee2d0cb41b55609c29e9e44e137824faafdf4ffa6d60781a2cf1dcbe1abb3f989c90c2d46bff00c4bbdc290ff73d9074934f7cb8b