Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3citra-wind...ly.zip
windows7-x64
citra-wind...ly.zip
windows10-2004-x64
1citra-wind...nt.dll
windows7-x64
1citra-wind...nt.dll
windows10-2004-x64
1citra-wind...re.dll
windows7-x64
1citra-wind...re.dll
windows10-2004-x64
1citra-wind...ui.dll
windows7-x64
1citra-wind...ui.dll
windows10-2004-x64
1citra-wind...ia.dll
windows7-x64
1citra-wind...ia.dll
windows10-2004-x64
1citra-wind...rk.dll
windows7-x64
1citra-wind...rk.dll
windows10-2004-x64
1citra-wind...vg.dll
windows7-x64
1citra-wind...vg.dll
windows10-2004-x64
1citra-wind...ts.dll
windows7-x64
1citra-wind...ts.dll
windows10-2004-x64
1citra-wind...DME.md
windows7-x64
3citra-wind...DME.md
windows10-2004-x64
3citra-wind...qt.exe
windows7-x64
1citra-wind...qt.exe
windows10-2004-x64
1citra-wind...om.exe
windows7-x64
1citra-wind...om.exe
windows10-2004-x64
1citra-wind...ra.exe
windows7-x64
1citra-wind...ra.exe
windows10-2004-x64
1citra-wind...ra.png
windows7-x64
3citra-wind...ra.png
windows10-2004-x64
3citra-wind...se.txt
windows7-x64
1citra-wind...se.txt
windows10-2004-x64
1citra-wind...in.dll
windows7-x64
1citra-wind...in.dll
windows10-2004-x64
1citra-wind...on.dll
windows7-x64
1citra-wind...on.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
citra-windows-msvc-20240303-0ff3440_nightly.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
citra-windows-msvc-20240303-0ff3440_nightly.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Concurrent.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Concurrent.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Core.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Core.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Gui.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Gui.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Multimedia.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Multimedia.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Network.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Network.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Svg.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Svg.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Widgets.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
citra-windows-msvc-20240303-0ff3440\Qt6Widgets.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
citra-windows-msvc-20240303-0ff3440\README.md
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
citra-windows-msvc-20240303-0ff3440\README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
citra-windows-msvc-20240303-0ff3440\citra-qt.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
citra-windows-msvc-20240303-0ff3440\citra-qt.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
citra-windows-msvc-20240303-0ff3440\citra-room.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
citra-windows-msvc-20240303-0ff3440\citra-room.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
citra-windows-msvc-20240303-0ff3440\citra.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
citra-windows-msvc-20240303-0ff3440\citra.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
citra-windows-msvc-20240303-0ff3440\dist\citra.png
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
citra-windows-msvc-20240303-0ff3440\dist\citra.png
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
citra-windows-msvc-20240303-0ff3440\license.txt
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
citra-windows-msvc-20240303-0ff3440\license.txt
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
citra-windows-msvc-20240303-0ff3440\plugins\generic\qtuiotouchplugin.dll
Resource
win7-20240319-en
Behavioral task
behavioral30
Sample
citra-windows-msvc-20240303-0ff3440\plugins\generic\qtuiotouchplugin.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
citra-windows-msvc-20240303-0ff3440\plugins\iconengines\qsvgicon.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
citra-windows-msvc-20240303-0ff3440\plugins\iconengines\qsvgicon.dll
Resource
win10v2004-20240226-en
General
-
Target
citra-windows-msvc-20240303-0ff3440\README.md
-
Size
4KB
-
MD5
3f14e4056fe49b06f75d60c06fa041d2
-
SHA1
8d920d16819ae470e6c854f8f60478944b687242
-
SHA256
1466a825150c613267d8ab061e6e729256562c2bdc65c1eeb6620028b1e975da
-
SHA512
8dd50389b1ea7216412bffea80b4116b8f84b35958e36457b8f71a0d0b729a5314efe9f44811573935950425abd66ed0da130440aae637c254a0b4938162c1d3
-
SSDEEP
96:cIMJzZyxzdjGnivgqvb5whcWlxbvoR8pIcbxubZvVUOYy:c2zdqnivD9DUIcbxubZtUO3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 AcroRd32.exe 2732 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2628 3020 cmd.exe 29 PID 3020 wrote to memory of 2628 3020 cmd.exe 29 PID 3020 wrote to memory of 2628 3020 cmd.exe 29 PID 2628 wrote to memory of 2732 2628 rundll32.exe 30 PID 2628 wrote to memory of 2732 2628 rundll32.exe 30 PID 2628 wrote to memory of 2732 2628 rundll32.exe 30 PID 2628 wrote to memory of 2732 2628 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\citra-windows-msvc-20240303-0ff3440\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\citra-windows-msvc-20240303-0ff3440\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\citra-windows-msvc-20240303-0ff3440\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52f76f92778cd154310ee3fb6c74502b4
SHA19921c5b32b348416f169f8b41d2d9b18d0b5ce31
SHA256220617373b0827c7b35263160a1f0c09c3a8a87a6bde4884a3f5be785dee085f
SHA5122e415da21bae5408efb80bc8da56e9fdb89dc47ef42f3c3e5e4323106279b1747e6f4532a0cbbc5188102058843b679f9067f4b79a4599d4a45d921404b796ca