Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
281s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
11/03/2024, 06:45
Behavioral task
behavioral1
Sample
Napalm Loader.pyc
Resource
win10-20240221-en
5 signatures
300 seconds
General
-
Target
Napalm Loader.pyc
-
Size
68KB
-
MD5
b7ca8ee18b13979be009f9cfa57c5f78
-
SHA1
cc706be1d0b96734502203fc726411883b4d55f4
-
SHA256
f412026c2efb1f93cbe70c115eefcf41e52d2a68df4be89da6562ebcd1ed9b56
-
SHA512
3dbfdfae12ca8be43a6bf9f5f93198f592a775a1e0acbb88e8ee91f8719253711e349a0653da9bbdac506e552397dd899c7fa88c1985b82cb2ee27539145dd89
-
SSDEEP
768:52RfPTS6QcmCM26/hfsz6oe+x1F1mAJbX3hElmXTxdhlzJsfCGMq+0AnjEUnrIFO:52E6QhjhQ8AHnxTGCGMq+F4qreO
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1681664450-2645008397-319333953-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1681664450-2645008397-319333953-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3396 OpenWith.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe 3396 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3396 wrote to memory of 1380 3396 OpenWith.exe 74 PID 3396 wrote to memory of 1380 3396 OpenWith.exe 74
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Napalm Loader.pyc"1⤵
- Modifies registry class
PID:2768
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Napalm Loader.pyc2⤵PID:1380
-