Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/02/2024, 13:53
240212-q69b9afc5s 1012/02/2024, 13:52
240212-q6r3zafc3w 1012/02/2024, 13:34
240212-qt47rsge54 10Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 13:52
Behavioral task
behavioral1
Sample
GBWhatsApp_v17.60.apk
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GBWhatsApp_v17.60.apk
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
GBWhatsApp_v17.60.apk
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
GBWhatsApp_v17.60.apk
Resource
win11-20231215-en
General
-
Target
GBWhatsApp_v17.60.apk
-
Size
75.6MB
-
MD5
d73fa603bb7dfbd53f2ec4d05617b9e0
-
SHA1
86f18b9d0ce32f3ff1c608ae4317329e4da44e1d
-
SHA256
3e596694e6c74a1991490f4bde5e2404fc1b6d57af8499b7fc67adb44e17394e
-
SHA512
4e004ec348e58f8229d1e3b5d2137b64dc09234d355425d8fa5544e67a4d4d80d3e098c2ba7bd5659e443050bae7a404e1a35a2341cd6809b5e83e1078d8bbc2
-
SSDEEP
1572864:2R4YowDIMNvpPjEYr3V1c4sQ0MmDKPwpJ4qHSXKTHcvmM0hV:26YoEXEqFR0rDG0THSmZV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\apk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\apk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.apk rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\apk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1076 2928 cmd.exe 29 PID 2928 wrote to memory of 1076 2928 cmd.exe 29 PID 2928 wrote to memory of 1076 2928 cmd.exe 29 PID 1076 wrote to memory of 2644 1076 rundll32.exe 30 PID 1076 wrote to memory of 2644 1076 rundll32.exe 30 PID 1076 wrote to memory of 2644 1076 rundll32.exe 30 PID 1076 wrote to memory of 2644 1076 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_v17.60.apk1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_v17.60.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_v17.60.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d7f63cef21635cf5e332803c259108fb
SHA14a5b536f52307b71591a36118269e21465b308ac
SHA256a69a6e493c1e8bf232cd3a3b93c8862f5f40d2816d2dbc7f38c2d8f311e3be32
SHA51216b78c32b664668e18e318dc5967f0e8f1464af088e5bf049e5f97c64b20554b48d2bc9d6d772bc4b7113867cf3b4478391056d738ab122825a28ebb57c0e1a0