Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1c2e896-rrpy.rar
windows7-x64
3c2e896-rrpy.rar
windows10-2004-x64
7rrpy/DZSB/...lc.rpf
windows7-x64
3rrpy/DZSB/...lc.rpf
windows10-2004-x64
3rrpy/DZSB/...or.yft
windows7-x64
3rrpy/DZSB/...or.yft
windows10-2004-x64
3rrpy/DZSB/...or.ytd
windows7-x64
3rrpy/DZSB/...or.ytd
windows10-2004-x64
3rrpy/DZSB/...hi.yft
windows7-x64
3rrpy/DZSB/...hi.yft
windows10-2004-x64
3rrpy/DZSB/...��.txt
windows7-x64
1rrpy/DZSB/...��.txt
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
c2e896-rrpy.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c2e896-rrpy.rar
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
rrpy/DZSB/Add-on/DZSB/dlc.rpf
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
rrpy/DZSB/Add-on/DZSB/dlc.rpf
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
rrpy/DZSB/Replace/emperor.yft
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
rrpy/DZSB/Replace/emperor.yft
Resource
win10v2004-20240220-en
Behavioral task
behavioral7
Sample
rrpy/DZSB/Replace/emperor.ytd
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
rrpy/DZSB/Replace/emperor.ytd
Resource
win10v2004-20240220-en
Behavioral task
behavioral9
Sample
rrpy/DZSB/Replace/emperor_hi.yft
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
rrpy/DZSB/Replace/emperor_hi.yft
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
rrpy/DZSB/readme读我.txt
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
rrpy/DZSB/readme读我.txt
Resource
win10v2004-20240220-en
General
-
Target
rrpy/DZSB/Replace/emperor_hi.yft
-
Size
5.4MB
-
MD5
f344fb7f26d79ac2f346845af425f658
-
SHA1
c1afbc0ee5e86e654d76d8ee7b100d1100cbff55
-
SHA256
7a42332625607471f8957c43c172c138a139d3109260e9a88cf7c90249f4482d
-
SHA512
7f7f26ac4062344dffec2a034b24843de63ded48161a988ff8cd1c6388c19a8f3b63547d55d53acf373ab5e914eb5bd6c51abe21bdcec05c7bb2b303131aacf5
-
SSDEEP
98304:nuSlVYCNkDWfEWUVLRp3eLl+ZFQkCSOfM2ZsLi9ocQmFYKFCB6l6Hx9BWik6FGfJ:nuZCNQWcJLRp3s+ZFQyOBj9h6iAzo16E
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\yft_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\yft_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\yft_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\yft_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\yft_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.yft rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.yft\ = "yft_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\yft_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2744 2500 cmd.exe 29 PID 2500 wrote to memory of 2744 2500 cmd.exe 29 PID 2500 wrote to memory of 2744 2500 cmd.exe 29 PID 2744 wrote to memory of 2868 2744 rundll32.exe 30 PID 2744 wrote to memory of 2868 2744 rundll32.exe 30 PID 2744 wrote to memory of 2868 2744 rundll32.exe 30 PID 2744 wrote to memory of 2868 2744 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\rrpy\DZSB\Replace\emperor_hi.yft1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rrpy\DZSB\Replace\emperor_hi.yft2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rrpy\DZSB\Replace\emperor_hi.yft"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5884feadf7d3b352f38565c12f571389b
SHA1d302df42ceca1ff5cb21749a08f333852e398676
SHA256d4ecaff240d9c864b01fd4f4a350eeeacbc033ffd8a04825bbeecbf9bc1c3165
SHA5127b62d239ec781c47fc5aaf0e222ad2b906ac59778ea2d9653407fa3858de9651ced0f57ea9b5adfb06a55d8594e77676722180e51d9acf8cc5382afd52fac9f2