Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1c2e896-rrpy.rar
windows7-x64
3c2e896-rrpy.rar
windows10-2004-x64
7rrpy/DZSB/...lc.rpf
windows7-x64
3rrpy/DZSB/...lc.rpf
windows10-2004-x64
3rrpy/DZSB/...or.yft
windows7-x64
3rrpy/DZSB/...or.yft
windows10-2004-x64
3rrpy/DZSB/...or.ytd
windows7-x64
3rrpy/DZSB/...or.ytd
windows10-2004-x64
3rrpy/DZSB/...hi.yft
windows7-x64
3rrpy/DZSB/...hi.yft
windows10-2004-x64
3rrpy/DZSB/...��.txt
windows7-x64
1rrpy/DZSB/...��.txt
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
c2e896-rrpy.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c2e896-rrpy.rar
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
rrpy/DZSB/Add-on/DZSB/dlc.rpf
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
rrpy/DZSB/Add-on/DZSB/dlc.rpf
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
rrpy/DZSB/Replace/emperor.yft
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
rrpy/DZSB/Replace/emperor.yft
Resource
win10v2004-20240220-en
Behavioral task
behavioral7
Sample
rrpy/DZSB/Replace/emperor.ytd
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
rrpy/DZSB/Replace/emperor.ytd
Resource
win10v2004-20240220-en
Behavioral task
behavioral9
Sample
rrpy/DZSB/Replace/emperor_hi.yft
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
rrpy/DZSB/Replace/emperor_hi.yft
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
rrpy/DZSB/readme读我.txt
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
rrpy/DZSB/readme读我.txt
Resource
win10v2004-20240220-en
General
-
Target
rrpy/DZSB/Add-on/DZSB/dlc.rpf
-
Size
27.6MB
-
MD5
71547aaa0a3e8efcbbda306accdd458a
-
SHA1
4ad76e8f22a38e9d45fe57334bdde04a4c4170df
-
SHA256
b7c1bc6315eeb814d77533285320aae610ab22cf2141c4e51dd5c7183545dd46
-
SHA512
bf868a9762a568c99ad7ba697c50e1c46e646094d3ead2a3135b0e63fcd7822c1b948f13ef4bd2c1241f1cf09e6a832a9530feeafc91ac387216f3ba42c3e645
-
SSDEEP
393216:04RFK0RZ6k35YrrJ8Wk1bYPfccJGCaWoNp3j+9mRz+:0UKeZ6ZvWXtUsCTo/3j+ii
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3328 OpenWith.exe