Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 17:54
Behavioral task
behavioral1
Sample
Flaggex_V1.4.rar
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Flaggex_V1.4.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Flaggex V1.3/Flaggex.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Flaggex V1.3/Flaggex.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
flaggex.pyc
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
flaggex.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Flaggex V1.3/config.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Flaggex V1.3/config.txt
Resource
win10v2004-20240221-en
General
-
Target
flaggex.pyc
-
Size
9KB
-
MD5
d401417dad834f69f76ce73db8f2235a
-
SHA1
ceb68f416d5177267ff85c488691cf73ab57ecbb
-
SHA256
2a9298ae278352c36765b0288729ead85a7e1461314fb3e8dc3fdc7ca0835f80
-
SHA512
981536fc5c8335f5d9e9a5f0061d2962d2f1e2c8a3599da9413f938a16a7bb5505e5fbb3233ac02887d2fe5f8d0e14776257d37056e61b9567b104a8b63f356e
-
SSDEEP
96:Cuvr67l7n0x7o75qRAlI7cX9DnYzeIE7wfQ1VFCWMJfqpUGw4YSHO9pcmjUqGYYH:CGi08RXRnuLEctqpBvu9pXUqGYyqSszK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2436 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2436 AcroRd32.exe 2436 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2516 1636 cmd.exe 29 PID 1636 wrote to memory of 2516 1636 cmd.exe 29 PID 1636 wrote to memory of 2516 1636 cmd.exe 29 PID 2516 wrote to memory of 2436 2516 rundll32.exe 30 PID 2516 wrote to memory of 2436 2516 rundll32.exe 30 PID 2516 wrote to memory of 2436 2516 rundll32.exe 30 PID 2516 wrote to memory of 2436 2516 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\flaggex.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\flaggex.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\flaggex.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dcb04bf624de61ad76332d5a4f65e111
SHA18d07311c357a72b5a6394fa6d4a7d12ef8231e73
SHA2566f7b10fa55ff73686c3835ad48acf453c08115eb6d560e2fd25a4ec131bd171f
SHA512dc48a84579b525f1eaf1ae957ac347a645fd54fa8161d548683dc8578f47128a353baae506560716a1d1b97a8107e080be7b249a8bf8680e247c92d9cdb1007e