Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1htdocs.rar
windows7-x64
3htdocs.rar
windows10-2004-x64
3htdocs/.htaccess
windows7-x64
3htdocs/.htaccess
windows10-2004-x64
3htdocs/index.php
windows7-x64
3htdocs/index.php
windows10-2004-x64
3htdocs/log/api.php
windows7-x64
3htdocs/log/api.php
windows10-2004-x64
3htdocs/log...ex.php
windows7-x64
3htdocs/log...ex.php
windows10-2004-x64
3htdocs/log...ex.php
windows7-x64
3htdocs/log...ex.php
windows10-2004-x64
3htdocs/log/index.php
windows7-x64
3htdocs/log/index.php
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
htdocs.rar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
htdocs.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
htdocs/.htaccess
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
htdocs/.htaccess
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
htdocs/index.php
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
htdocs/index.php
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
htdocs/log/api.php
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
htdocs/log/api.php
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
htdocs/log/api/list/index.php
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
htdocs/log/api/list/index.php
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
htdocs/log/api/login/index.php
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
htdocs/log/api/login/index.php
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
htdocs/log/index.php
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
htdocs/log/index.php
Resource
win10v2004-20240419-en
General
-
Target
htdocs/.htaccess
-
Size
179B
-
MD5
5bf2052f87671728984ab50144d2e6c4
-
SHA1
ac97dd01b0f32e279367b5f74dcb7a35c33b65b2
-
SHA256
32b4c5295495fdb4bb642849e9d76f13267d0ab1b23016d7370438c89a3fddee
-
SHA512
66dbb9bf748f05e75ecda636f6a5ee9f6fa33612e71c81ad874bb5a6f62a5ca5322c82cb71c4da12f33b8eece8322bc595d12a8a67b452d52658c951a3fd6c12
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\htaccess_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.htaccess rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.htaccess\ = "htaccess_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\htaccess_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\htaccess_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\htaccess_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\htaccess_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\htaccess_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 AcroRd32.exe 2684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2504 2972 cmd.exe 29 PID 2972 wrote to memory of 2504 2972 cmd.exe 29 PID 2972 wrote to memory of 2504 2972 cmd.exe 29 PID 2504 wrote to memory of 2684 2504 rundll32.exe 30 PID 2504 wrote to memory of 2684 2504 rundll32.exe 30 PID 2504 wrote to memory of 2684 2504 rundll32.exe 30 PID 2504 wrote to memory of 2684 2504 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\htdocs\.htaccess1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\htdocs\.htaccess2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\htdocs\.htaccess"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD579cd404cbc8135676e84f5143b0db9bd
SHA1eb061994109c36609f163ac3fb4bb6bd34e8c6f2
SHA256a47b8271baedbdc3a67d8b8719e9bf9d8cf79c1b85e6d99658c2f79ecd922a64
SHA51270d1a6426ee69dcdcf16383bc4bd8258ef85bee29439c52832bc590ed3fc1bd4735ebf41ed3012dcf9fdf6399818f619f55aab95a3cd5ba934e9a444eb5dcaf4