Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
101680kb DMF...er.exe
windows7-x64
71680kb DMF...er.exe
windows10-2004-x64
7AntMem v13...64.vbs
windows7-x64
1AntMem v13...64.vbs
windows10-2004-x64
1Atlantis N...is.exe
windows7-x64
8Atlantis N...is.exe
windows10-2004-x64
7CSVboard v...rd.exe
windows7-x64
7CSVboard v...rd.exe
windows10-2004-x64
7Encopy5/encopy5.exe
windows7-x64
7Encopy5/encopy5.exe
windows10-2004-x64
7Eve/eve.exe
windows7-x64
8Eve/eve.exe
windows10-2004-x64
1FoldersRep...ep.exe
windows7-x64
9FoldersRep...ep.exe
windows10-2004-x64
9FoldersRep...t.html
windows7-x64
1FoldersRep...t.html
windows10-2004-x64
1MICROFTP/MicroFTP.exe
windows7-x64
7MICROFTP/MicroFTP.exe
windows10-2004-x64
7PDFproduce...er.exe
windows7-x64
7PDFproduce...er.exe
windows10-2004-x64
7Password G...pg.exe
windows7-x64
7Password G...pg.exe
windows10-2004-x64
7ShackUp/ShackUp.exe
windows7-x64
7ShackUp/ShackUp.exe
windows10-2004-x64
7Spread32/Spread32.exe
windows7-x64
7Spread32/Spread32.exe
windows10-2004-x64
7TheGun/THEGUN.exe
windows7-x64
1TheGun/THEGUN.exe
windows10-2004-x64
1Xcalday Ca...ay.exe
windows7-x64
7Xcalday Ca...ay.exe
windows10-2004-x64
7Xpass/xpass.dll
windows7-x64
7Xpass/xpass.dll
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 07:16
Behavioral task
behavioral1
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Atlantis Nova/Atlantis.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Atlantis Nova/Atlantis.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
CSVboard v1.1/CSVboard.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
CSVboard v1.1/CSVboard.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Encopy5/encopy5.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Encopy5/encopy5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Eve/eve.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Eve/eve.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
FoldersReport/folrep.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
FoldersReport/folrep.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
FoldersReport/report.html
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FoldersReport/report.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
MICROFTP/MicroFTP.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
MICROFTP/MicroFTP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
PDFproducer/PDFproducer.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
PDFproducer/PDFproducer.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Password Generator/pg.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Password Generator/pg.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
ShackUp/ShackUp.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ShackUp/ShackUp.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Spread32/Spread32.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Spread32/Spread32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
TheGun/THEGUN.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
TheGun/THEGUN.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Xcalday Calendar/xcalday.exe
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
Xcalday Calendar/xcalday.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Xpass/xpass.dll
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
Xpass/xpass.dll
Resource
win10v2004-20240508-en
General
-
Target
CSVboard v1.1/CSVboard.exe
-
Size
71KB
-
MD5
7e41a080dde71f26ddc6f92f6d1f748c
-
SHA1
b1048a624aa5806ff65f8b93e3dc9c0af9b5cba4
-
SHA256
5692c8b706a4a2a669a23a49118a7e496a8eddfa5a1c729f593a6e893f4e390c
-
SHA512
32cc2237f9e4ce48ede9ca78ade400a509eda1277d0159907db00ab1938aeb2263a4939efd301622f4e3f4409b6cfa922ab1f64462f9fbd94f588fdf0bed9de9
-
SSDEEP
1536:WrNFwnxAKJIUYVEBw5VAKfZswejcy25DByyk:WrNexJSVEB0fZFejcN5DByyk
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1448 icacls.exe -
resource yara_rule behavioral8/memory/2668-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral8/memory/2668-2-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5044 javaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 5044 2668 CSVboard.exe 80 PID 2668 wrote to memory of 5044 2668 CSVboard.exe 80 PID 5044 wrote to memory of 1448 5044 javaw.exe 84 PID 5044 wrote to memory of 1448 5044 javaw.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\CSVboard v1.1\CSVboard.exe"C:\Users\Admin\AppData\Local\Temp\CSVboard v1.1\CSVboard.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\CSVboard v1.1\CSVboard.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:1448
-
-
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv KwNQdXLaVU6WzTcdlpLw4w.01⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5dcc3466cb05788d5b662a285577a0494
SHA141fdc376346f8d912746bf96826aedb0451d5837
SHA2566f21319c1e8c9d613244a5c7978e19e9367405a768c016e4a24f332c36572a9f
SHA5121fb12e79c90d6b02a13e49f8c0c51c7db42446c50073c5185278a94e51a11cfa27fe822de1aa80a51b166f39077bd4a8cf7e00cabf31dd69f77f62888a4e12b5