Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3ZC-AIO/any...t__.py
windows7-x64
3ZC-AIO/any...t__.py
windows10-2004-x64
3ZC-AIO/any...ase.py
windows7-x64
3ZC-AIO/any...ase.py
windows10-2004-x64
10ZC-AIO/any...pat.py
windows7-x64
3ZC-AIO/any...pat.py
windows10-2004-x64
3ZC-AIO/any...ons.py
windows7-x64
3ZC-AIO/any...ons.py
windows10-2004-x64
3ZC-AIO/any...lds.py
windows7-x64
3ZC-AIO/any...lds.py
windows10-2004-x64
3ZC-AIO/any...sks.py
windows7-x64
3ZC-AIO/any...sks.py
windows10-2004-x64
3ZC-AIO/any...emo.py
windows7-x64
3ZC-AIO/any...emo.py
windows10-2004-x64
3ZC-AIO/any...tup.py
windows7-x64
3ZC-AIO/any...tup.py
windows10-2004-x64
3ZC-AIO/any...ch.exe
windows7-x64
7ZC-AIO/any...ch.exe
windows10-2004-x64
7ZC-AIO/install.bat
windows7-x64
1ZC-AIO/install.bat
windows10-2004-x64
1ZC-AIO/mod...12.pyc
windows7-x64
3ZC-AIO/mod...12.pyc
windows10-2004-x64
3ZC-AIO/mod...12.pyc
windows7-x64
3ZC-AIO/mod...12.pyc
windows10-2004-x64
3ZC-AIO/mod...12.pyc
windows7-x64
3ZC-AIO/mod...12.pyc
windows10-2004-x64
3ZC-AIO/mod...12.pyc
windows7-x64
3ZC-AIO/mod...12.pyc
windows10-2004-x64
3ZC-AIO/mod...12.pyc
windows7-x64
3ZC-AIO/mod...12.pyc
windows10-2004-x64
3ZC-AIO/mod...12.pyc
windows7-x64
3ZC-AIO/mod...12.pyc
windows10-2004-x64
3Analysis
-
max time kernel
1560s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20240221-de -
resource tags
arch:x64arch:x86image:win7-20240221-delocale:de-deos:windows7-x64systemwindows -
submitted
11/03/2024, 15:08
Behavioral task
behavioral1
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/__init__.py
Resource
win7-20240221-de
Behavioral task
behavioral2
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/__init__.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral3
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/base.py
Resource
win7-20240221-de
Behavioral task
behavioral4
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/base.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral5
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/compat.py
Resource
win7-20240221-de
Behavioral task
behavioral6
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/compat.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral7
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/exceptions.py
Resource
win7-20240221-de
Behavioral task
behavioral8
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/exceptions.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral9
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/fields.py
Resource
win7-20240221-de
Behavioral task
behavioral10
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/fields.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral11
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/tasks.py
Resource
win7-20240221-de
Behavioral task
behavioral12
Sample
ZC-AIO/anycaptcha-python-main/anycaptcha/tasks.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral13
Sample
ZC-AIO/anycaptcha-python-main/demo.py
Resource
win7-20240221-de
Behavioral task
behavioral14
Sample
ZC-AIO/anycaptcha-python-main/demo.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral15
Sample
ZC-AIO/anycaptcha-python-main/setup.py
Resource
win7-20240221-de
Behavioral task
behavioral16
Sample
ZC-AIO/anycaptcha-python-main/setup.py
Resource
win10v2004-20240226-de
Behavioral task
behavioral17
Sample
ZC-AIO/anycaptcha-python-main/varssearch.exe
Resource
win7-20240221-de
Behavioral task
behavioral18
Sample
ZC-AIO/anycaptcha-python-main/varssearch.exe
Resource
win10v2004-20240226-de
Behavioral task
behavioral19
Sample
ZC-AIO/install.bat
Resource
win7-20240221-de
Behavioral task
behavioral20
Sample
ZC-AIO/install.bat
Resource
win10v2004-20240226-de
Behavioral task
behavioral21
Sample
ZC-AIO/modules/__pycache__/config.cpython-312.pyc
Resource
win7-20240220-de
Behavioral task
behavioral22
Sample
ZC-AIO/modules/__pycache__/config.cpython-312.pyc
Resource
win10v2004-20240226-de
Behavioral task
behavioral23
Sample
ZC-AIO/modules/__pycache__/functions.cpython-312.pyc
Resource
win7-20240221-de
Behavioral task
behavioral24
Sample
ZC-AIO/modules/__pycache__/functions.cpython-312.pyc
Resource
win10v2004-20240226-de
Behavioral task
behavioral25
Sample
ZC-AIO/modules/__pycache__/start.cpython-312.pyc
Resource
win7-20240221-de
Behavioral task
behavioral26
Sample
ZC-AIO/modules/__pycache__/start.cpython-312.pyc
Resource
win10v2004-20240226-de
Behavioral task
behavioral27
Sample
ZC-AIO/modules/__pycache__/updater.cpython-312.pyc
Resource
win7-20240221-de
Behavioral task
behavioral28
Sample
ZC-AIO/modules/__pycache__/updater.cpython-312.pyc
Resource
win10v2004-20240226-de
Behavioral task
behavioral29
Sample
ZC-AIO/modules/__pycache__/variables.cpython-312.pyc
Resource
win7-20240221-de
Behavioral task
behavioral30
Sample
ZC-AIO/modules/__pycache__/variables.cpython-312.pyc
Resource
win10v2004-20240226-de
Behavioral task
behavioral31
Sample
ZC-AIO/modules/checkers/__pycache__/bonk_io.cpython-312.pyc
Resource
win7-20240221-de
Behavioral task
behavioral32
Sample
ZC-AIO/modules/checkers/__pycache__/bonk_io.cpython-312.pyc
Resource
win10v2004-20240226-de
General
-
Target
ZC-AIO/anycaptcha-python-main/anycaptcha/compat.py
-
Size
278B
-
MD5
5c97708c4dc15943eff639b19e87b2ee
-
SHA1
10aa100c8c02abd4de745977e142da3fac30a7d3
-
SHA256
eea7e96fd695e28ce2acc4b379f71e2948ceabfceecd0c4e1b25260d3710e074
-
SHA512
085ad3ecbee5d61a0fca9ce5c300fc3196539a7d47e61cde4b46c4c4bcb3c23a10f2abc783cffa4c4a8157f315f88667e9fbda5f720eb7e9e5a717754b2e809d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 AcroRd32.exe 2716 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2628 2596 cmd.exe 29 PID 2596 wrote to memory of 2628 2596 cmd.exe 29 PID 2596 wrote to memory of 2628 2596 cmd.exe 29 PID 2628 wrote to memory of 2716 2628 rundll32.exe 30 PID 2628 wrote to memory of 2716 2628 rundll32.exe 30 PID 2628 wrote to memory of 2716 2628 rundll32.exe 30 PID 2628 wrote to memory of 2716 2628 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ZC-AIO\anycaptcha-python-main\anycaptcha\compat.py1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ZC-AIO\anycaptcha-python-main\anycaptcha\compat.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ZC-AIO\anycaptcha-python-main\anycaptcha\compat.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5da64c6b40cb87fa5f91f431a3c22c283
SHA16afd56e9bc3ed045f7d05c854d282d0e2106fd24
SHA256d0e33fbbf19785540540175ae4863ccf83f8bbcd88f1ecfc1081ed34ce77f230
SHA5121da9acf01c79d852bf7f3cb9c46d4bcc96ad38c64b043824d98e937c6cbad813144624494113190e39f9b50124d449a14e7d92c2a0ceabc533d08019e1e2d74a