Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
4Static
static
1Payload/Li...beriOS
macos-10.15-amd64
1amfidebilitate
macos-10.15-amd64
1bin/bash
macos-10.15-amd64
4bin/cat
macos-10.15-amd64
1bin/chmod
macos-10.15-amd64
1bin/cp
macos-10.15-amd64
4bin/date
macos-10.15-amd64
1bin/dd
macos-10.15-amd64
4bin/hostname
macos-10.15-amd64
1bin/kill
macos-10.15-amd64
1bin/launchctl
macos-10.15-amd64
1bin/ln
macos-10.15-amd64
4bin/ls
macos-10.15-amd64
1bin/mkdir
macos-10.15-amd64
4bin/mv
macos-10.15-amd64
1bin/pwd
macos-10.15-amd64
1bin/rm
macos-10.15-amd64
4bin/rmdir
macos-10.15-amd64
1bin/sh
macos-10.15-amd64
1bin/sleep
macos-10.15-amd64
1bin/stty
macos-10.15-amd64
4bin/sync
macos-10.15-amd64
1bin/zsh
macos-10.15-amd64
1makeMeAtHome.sh
windows7-x64
3makeMeAtHome.sh
windows10-2004-x64
3sbin/dmesg
macos-10.15-amd64
sbin/ifconfig
macos-10.15-amd64
4sbin/kextunload
macos-10.15-amd64
1sbin/md5
macos-10.15-amd64
1sbin/mknod
macos-10.15-amd64
4sbin/ping
macos-10.15-amd64
1sbin/shutdown
macos-10.15-amd64
1Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
Payload/LiberiOS.app/LiberiOS
Resource
macos-20240410-en
Behavioral task
behavioral2
Sample
amfidebilitate
Resource
macos-20240410-en
Behavioral task
behavioral3
Sample
bin/bash
Resource
macos-20240410-en
Behavioral task
behavioral4
Sample
bin/cat
Resource
macos-20240410-en
Behavioral task
behavioral5
Sample
bin/chmod
Resource
macos-20240410-en
Behavioral task
behavioral6
Sample
bin/cp
Resource
macos-20240410-en
Behavioral task
behavioral7
Sample
bin/date
Resource
macos-20240410-en
Behavioral task
behavioral8
Sample
bin/dd
Resource
macos-20240410-en
Behavioral task
behavioral9
Sample
bin/hostname
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
bin/kill
Resource
macos-20240410-en
Behavioral task
behavioral11
Sample
bin/launchctl
Resource
macos-20240410-en
Behavioral task
behavioral12
Sample
bin/ln
Resource
macos-20240410-en
Behavioral task
behavioral13
Sample
bin/ls
Resource
macos-20240410-en
Behavioral task
behavioral14
Sample
bin/mkdir
Resource
macos-20240410-en
Behavioral task
behavioral15
Sample
bin/mv
Resource
macos-20240410-en
Behavioral task
behavioral16
Sample
bin/pwd
Resource
macos-20240410-en
Behavioral task
behavioral17
Sample
bin/rm
Resource
macos-20240410-en
Behavioral task
behavioral18
Sample
bin/rmdir
Resource
macos-20240410-en
Behavioral task
behavioral19
Sample
bin/sh
Resource
macos-20240410-en
Behavioral task
behavioral20
Sample
bin/sleep
Resource
macos-20240410-en
Behavioral task
behavioral21
Sample
bin/stty
Resource
macos-20240410-en
Behavioral task
behavioral22
Sample
bin/sync
Resource
macos-20240410-en
Behavioral task
behavioral23
Sample
bin/zsh
Resource
macos-20240410-en
Behavioral task
behavioral24
Sample
makeMeAtHome.sh
Resource
win7-20240508-en
Behavioral task
behavioral25
Sample
makeMeAtHome.sh
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
sbin/dmesg
Resource
macos-20240410-en
Behavioral task
behavioral27
Sample
sbin/ifconfig
Resource
macos-20240410-en
Behavioral task
behavioral28
Sample
sbin/kextunload
Resource
macos-20240410-en
Behavioral task
behavioral29
Sample
sbin/md5
Resource
macos-20240410-en
Behavioral task
behavioral30
Sample
sbin/mknod
Resource
macos-20240410-en
Behavioral task
behavioral31
Sample
sbin/ping
Resource
macos-20240410-en
Behavioral task
behavioral32
Sample
sbin/shutdown
Resource
macos-20240410-en
General
-
Target
makeMeAtHome.sh
-
Size
571B
-
MD5
ac19f99b7625453c20abbc173aa54171
-
SHA1
40197d682892fff03b5c29c1eb53e08455eb3eed
-
SHA256
f48778840169c99011499d36b5d9a8f4ed3e2a52e01c6a7795c1e947ae3a2baf
-
SHA512
4e292510cfe6c2b09d7fb9878a81c7edb78c8dfb498eb689c95a1138c5bb2bd0d76d0e81f1b0c088b1d93224d2d593933011b221ca19c28c5f760fa0ff2bfbe9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2632 2576 cmd.exe 29 PID 2576 wrote to memory of 2632 2576 cmd.exe 29 PID 2576 wrote to memory of 2632 2576 cmd.exe 29 PID 2632 wrote to memory of 2640 2632 rundll32.exe 30 PID 2632 wrote to memory of 2640 2632 rundll32.exe 30 PID 2632 wrote to memory of 2640 2632 rundll32.exe 30 PID 2632 wrote to memory of 2640 2632 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\makeMeAtHome.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\makeMeAtHome.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\makeMeAtHome.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5540f5d4c66d5f8653141ab6bd04c9475
SHA10941720a76fb9652a4bafa9e91e421635e1912dd
SHA2569f2aa622f374bd20526710b0fd9a2d81456927eefd6dc6e0db9e81091991d967
SHA5122d98bb1ecd3e788ff359818b2db09f3bbc0a66dd675e7fbc9e39c8028ccbd397abd0d55541672454babcd6f6f80b20f996e2a1b3b24e64933b5e20e856152559