Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
4Static
static
3Clip.Studi...1).zip
windows7-x64
1Clip.Studi...1).zip
windows10-2004-x64
1Crack/CLIP...nt.exe
windows7-x64
1Crack/CLIP...nt.exe
windows10-2004-x64
1ReadMe (Ho...l).txt
windows7-x64
1ReadMe (Ho...l).txt
windows10-2004-x64
1Screen.png
windows7-x64
3Screen.png
windows10-2004-x64
3Setup.exe
windows7-x64
4Setup.exe
windows10-2004-x64
4TestProjec...n.clip
windows7-x64
3TestProjec...n.clip
windows10-2004-x64
3TestProjec...o.clip
windows7-x64
3TestProjec...o.clip
windows10-2004-x64
3Analysis
-
max time kernel
104s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
Clip.Studio.Paint.EX.v2.0.0.x64(1).zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Clip.Studio.Paint.EX.v2.0.0.x64(1).zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Crack/CLIPStudioPaint.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Crack/CLIPStudioPaint.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
ReadMe (How to Install).txt
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ReadMe (How to Install).txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Screen.png
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Screen.png
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
TestProjects/Illustration.clip
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
TestProjects/Illustration.clip
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
TestProjects/okamoto.clip
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
TestProjects/okamoto.clip
Resource
win10v2004-20240221-en
General
-
Target
TestProjects/okamoto.clip
-
Size
9.7MB
-
MD5
0524c1ec1769fb36414125297cca848d
-
SHA1
841c49a2decfa93c6888fdd28359c752a849fbe5
-
SHA256
1fa52d07cc58bb0790bf7dd06e7e930252a4b65b891d2ed413e308092d5b90cc
-
SHA512
5165a37c761c0452d9d9d21f5e08df845deacac35f72c0b7786eae40283af3a3e71dab35c6aa1cb310927b77aea619c8c829ef861da1b15a451667776c1fd5c4
-
SSDEEP
196608:/V2qKsjqFH0S1AtwAmfFZfT+RaAh+x19ZivyutHfv:/VlKtU1tEy1c9ZZK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\clip_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\clip_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\clip_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.clip rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.clip\ = "clip_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\clip_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\clip_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\clip_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2832 AcroRd32.exe 2832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1952 2492 cmd.exe 31 PID 2492 wrote to memory of 1952 2492 cmd.exe 31 PID 2492 wrote to memory of 1952 2492 cmd.exe 31 PID 1952 wrote to memory of 2832 1952 rundll32.exe 32 PID 1952 wrote to memory of 2832 1952 rundll32.exe 32 PID 1952 wrote to memory of 2832 1952 rundll32.exe 32 PID 1952 wrote to memory of 2832 1952 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TestProjects\okamoto.clip1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TestProjects\okamoto.clip2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TestProjects\okamoto.clip"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ef44683a80a551e07e3dee2ba062f5e0
SHA1c47f3853f438bbe7be6dda446fc779cf12e549da
SHA256dd917b2ef5e8663faa092aa180cfa7b40b221e3eff5450bfa160a83a9b6f527a
SHA512c4471a78a737e731a2dc34b2755e276a27d5a74cfa2a1afb05e598158f5d992bc4843b1606c7e208295fa9a421255ad8037e7570f0d31ca3d750d97998ee901d