Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Loveware-master.zip
windows7-x64
1Loveware-m...ort.md
windows7-x64
3Loveware-m...gs.yml
windows7-x64
3Loveware-m...UCT.md
windows7-x64
3Loveware-m...ING.md
windows7-x64
3Loveware-m...er.jpg
windows7-x64
3Loveware-m...er.exe
windows7-x64
7Loveware-m...4).exe
windows7-x64
7Loveware-m...gs.ini
windows7-x64
1Loveware-m...er.png
windows7-x64
3Loveware-m...re.ico
windows7-x64
3Loveware-m...re.png
windows7-x64
3Loveware-m...ki.png
windows7-x64
3Loveware-m...ar.png
windows7-x64
3Loveware-m...ICENSE
windows7-x64
1Loveware-m...ON.txt
windows7-x64
1Loveware-m...ad.exe
windows7-x64
6Loveware-m...ME.txt
windows7-x64
1Loveware-m...re.bat
windows7-x64
4Loveware-m...kspace
windows7-x64
3Loveware-m...re.ico
windows7-x64
3Loveware-m...DME.md
windows7-x64
3Loveware-m...ig.yml
windows7-x64
3Analysis
-
max time kernel
1566s -
max time network
1569s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/02/2024, 15:07
Behavioral task
behavioral1
Sample
Loveware-master.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Loveware-master/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win7-20231215-en
Behavioral task
behavioral3
Sample
Loveware-master/.github/workflows/greetings.yml
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Loveware-master/CODE_OF_CONDUCT.md
Resource
win7-20231215-en
Behavioral task
behavioral5
Sample
Loveware-master/CONTRIBUTING.md
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Loveware-master/Extras/Banner.jpg
Resource
win7-20231215-en
Behavioral task
behavioral7
Sample
Loveware-master/Extras/CONVERTER/Bat_To_Exe_Converter.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Loveware-master/Extras/CONVERTER/Bat_To_Exe_Converter_(x64).exe
Resource
win7-20231129-en
Behavioral task
behavioral9
Sample
Loveware-master/Extras/CONVERTER/settings.ini
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
Loveware-master/Extras/Footer.png
Resource
win7-20231215-en
Behavioral task
behavioral11
Sample
Loveware-master/Extras/Loveware.ico
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Loveware-master/Extras/Loveware.png
Resource
win7-20231215-en
Behavioral task
behavioral13
Sample
Loveware-master/Extras/PayloadsWiki.png
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Loveware-master/Extras/SideBar.png
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
Loveware-master/LICENSE
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Loveware-master/Loveware/DOCUMENTATION.txt
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
Loveware-master/Loveware/FinalPayload/FinalPayload.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Loveware-master/Loveware/FinalPayload/README.txt
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
Loveware-master/Loveware/Loveware.bat
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
Loveware-master/Loveware/Loveware.code-workspace
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
Loveware-master/Loveware/Loveware.ico
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
Loveware-master/README.md
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
Loveware-master/_config.yml
Resource
win7-20231129-en
General
-
Target
Loveware-master/.github/ISSUE_TEMPLATE/bug_report.md
-
Size
834B
-
MD5
e468801d29e6b66b0d496136e22e8b34
-
SHA1
83d211c67c12e8c1f6e9f796cfd0cecbf5160e15
-
SHA256
0c8d64f29fb4536513653bf8c97da30f3340e2041b91c8952db1515d6b23a7b3
-
SHA512
764dd839b31e1a112eed1a9f61bb215b276af1975b15335054e591942445826d3924c73bf7d1ae968c5c93b1cdeb0bdd2ba0db4b02c599ecc35a6d1f7527485b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2876 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2876 AcroRd32.exe 2876 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2784 2188 cmd.exe 29 PID 2188 wrote to memory of 2784 2188 cmd.exe 29 PID 2188 wrote to memory of 2784 2188 cmd.exe 29 PID 2784 wrote to memory of 2876 2784 rundll32.exe 30 PID 2784 wrote to memory of 2876 2784 rundll32.exe 30 PID 2784 wrote to memory of 2876 2784 rundll32.exe 30 PID 2784 wrote to memory of 2876 2784 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Loveware-master\.github\ISSUE_TEMPLATE\bug_report.md1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Loveware-master\.github\ISSUE_TEMPLATE\bug_report.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Loveware-master\.github\ISSUE_TEMPLATE\bug_report.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52b0aa8558073b441ffd417d80c7eb98e
SHA1ce616f89611e27d9348e24951cd6f3b1b5828c4e
SHA256937f63b41e4376c25b3adcf508bd96567eef9d77e902e6edfa401bab4e0d5786
SHA512ec436f77ac3d89a811ca9c02224a89ed549701df83cde52779a857a7378c9b22a0abd7fec33251a71548bf20d4af41d33c0ace4c773ab8c82f3476cca5568696