Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3Kiwi X Ext...ML.dll
windows7-x64
1Kiwi X Ext...ML.dll
windows10-2004-x64
1Kiwi X Ext...al.exe
windows7-x64
1Kiwi X Ext...al.exe
windows10-2004-x64
1Kiwi X Ext...config
windows7-x64
3Kiwi X Ext...config
windows10-2004-x64
3Kiwi X Ext...al.exe
windows7-x64
1Kiwi X Ext...al.exe
windows10-2004-x64
3Kiwi X Ext...g.json
windows7-x64
3Kiwi X Ext...g.json
windows10-2004-x64
3Kiwi X Ext...ay.cfg
windows7-x64
3Kiwi X Ext...ay.cfg
windows10-2004-x64
3Kiwi X Ext...lt.cfg
windows7-x64
3Kiwi X Ext...lt.cfg
windows10-2004-x64
3Kiwi X Ext...me.dll
windows7-x64
1Kiwi X Ext...me.dll
windows10-2004-x64
1Kiwi X Ext...me.lib
windows7-x64
3Kiwi X Ext...me.lib
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
Kiwi X External/DirectML.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Kiwi X External/DirectML.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Kiwi X External/Kiwi X External.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Kiwi X External/Kiwi X External.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Kiwi X External/Kiwi X External.dll.config
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Kiwi X External/Kiwi X External.dll.config
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Kiwi X External/Kiwi X External.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Kiwi X External/Kiwi X External.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
Kiwi X External/Kiwi X External.runtimeconfig.json
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Kiwi X External/Kiwi X External.runtimeconfig.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Kiwi X External/bin/Overlay.cfg
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Kiwi X External/bin/Overlay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Kiwi X External/bin/configs/Default.cfg
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Kiwi X External/bin/configs/Default.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Kiwi X External/onnxruntime.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Kiwi X External/onnxruntime.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Kiwi X External/onnxruntime.lib
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Kiwi X External/onnxruntime.lib
Resource
win10v2004-20231222-en
General
-
Target
Kiwi X External/Kiwi X External.dll.config
-
Size
1KB
-
MD5
0c6c99f46941beba3add94fc6be3a3ea
-
SHA1
f27c3f2e0624bb80225dc226720a52e9cef9d42a
-
SHA256
10d79a7eb0ca847d30c86c9fa73d3be399f6d9746c72021c1faf1453c85c6dc6
-
SHA512
eb1df682124d57ca04e3c4ef8158ec736d2795d740bbf66b509a8cba0fa3612943ca0742774cdad4b0807523b3e5246479965c0cc5929e86139c35583f48ea78
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2456 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2456 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2456 AcroRd32.exe 2456 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2456 2852 cmd.exe 29 PID 2852 wrote to memory of 2456 2852 cmd.exe 29 PID 2852 wrote to memory of 2456 2852 cmd.exe 29 PID 2852 wrote to memory of 2456 2852 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Kiwi X External\Kiwi X External.dll.config"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Kiwi X External\Kiwi X External.dll.config"2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51c3ce329e49f1552129252d893ce1f40
SHA17521fdbde02e0a82e0a8522cfe3ff233685957f8
SHA256f7af80a79a335477df3c7146f273a47848883f8642994aff9d34243df951c166
SHA51291fea5e52e1a3a69aece66bb5e9cfda7498dc6949c4d150ddf876acc50c00e0b9e98c36a70f2fda8068a4519e1f9e5c52d376e4c96806a6b9dfb8bb9c5e158c2