Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
07/03/2024, 09:34
240307-lj9bhsgc99 707/03/2024, 09:31
240307-lhafssgc68 707/03/2024, 09:29
240307-lf3dssgc37 7Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 09:34
Behavioral task
behavioral1
Sample
EkexClient.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
EkexClient.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
EkexClient.exe.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
EkexClient.exe.pyc
Resource
win10v2004-20240226-en
General
-
Target
EkexClient.exe.pyc
-
Size
69KB
-
MD5
2a4c573d98e6559ddc315dfc091a841a
-
SHA1
396ec4ae1c2845a867ddd3010db5da3be86c5740
-
SHA256
ad38b897bf067494c60d592e27b36d187691b66f8fb07639c6bc436f1838d775
-
SHA512
729096e3305421e02e3d4ddb2c2094c84bd38f264c01230bb9b127b4cf75de01bbaafb9dcf7a54d1b800521d5a59b70535ec9b6de2931a15999c71e1f3d00b54
-
SSDEEP
768:0+PS3Irw/gMxvCWUL8OsvPi3K2nFcWAXTxcPdCA79/GleK1AnjdRnrBI5y:0TIrYv+SNxjlJKpVrn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2624 AcroRd32.exe 2624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2692 1740 cmd.exe 29 PID 1740 wrote to memory of 2692 1740 cmd.exe 29 PID 1740 wrote to memory of 2692 1740 cmd.exe 29 PID 2692 wrote to memory of 2624 2692 rundll32.exe 30 PID 2692 wrote to memory of 2624 2692 rundll32.exe 30 PID 2692 wrote to memory of 2624 2692 rundll32.exe 30 PID 2692 wrote to memory of 2624 2692 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\EkexClient.exe.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\EkexClient.exe.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\EkexClient.exe.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b51dd73015b70b82212f2772f1a50d24
SHA1d80352c67b044c6f862bc0548e98d405b5c6b2dd
SHA2560e90d8214ebb845e8555cd44c0501bbe6e8cf8f1b2b80635017c92728341e11c
SHA512da54cd714d2b955a22e36cbb96b5dca8a0fcb31dbc25926f8098600cd5acf18b0e791575b0e2de685056a12f73261b52dc8040ec116ef768ca0e3cfd65bfbb19