Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1helium.rar
windows7-x64
3helium.rar
windows10-2004-x64
3config.json
windows7-x64
3config.json
windows10-2004-x64
3main.py
windows7-x64
3main.py
windows10-2004-x64
3src/captcha.py
windows7-x64
3src/captcha.py
windows10-2004-x64
3src/console.py
windows7-x64
3src/console.py
windows10-2004-x64
3src/discord.py
windows7-x64
3src/discord.py
windows10-2004-x64
3src/functions.py
windows7-x64
3src/functions.py
windows10-2004-x64
3src/menu.py
windows7-x64
3src/menu.py
windows10-2004-x64
3src/scrape.py
windows7-x64
3src/scrape.py
windows10-2004-x64
3src/session.py
windows7-x64
3src/session.py
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
helium.rar
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
helium.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
config.json
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
config.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
main.py
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
main.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
src/captcha.py
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
src/captcha.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
src/console.py
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
src/console.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
src/discord.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
src/discord.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
src/functions.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
src/functions.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
src/menu.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
src/menu.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
src/scrape.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
src/scrape.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
src/session.py
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
src/session.py
Resource
win10v2004-20240426-en
General
-
Target
src/scrape.py
-
Size
7KB
-
MD5
add9059c4fcfb5c634191ed262dd8ef2
-
SHA1
a8bd0a1c138d4b0c530e7002e27923f6812142d4
-
SHA256
ffeed973150f6ef0ec356cccd0d6400ba8a0fac3be1876fbf1ab15c958f570ca
-
SHA512
f1972699545cbea9a752f13755e37c8ce8101507e58749ccd3850101d480cef3b46bf32f4b709e5b709de077683abf2b2113397ceb56642bb46da488b6d8d7dd
-
SSDEEP
192:QcC0vOmmGM0rxjUak8GKObLGVq0SBbQG/1Lc2S5E:JmGM01jc8GKOkZS1QqSi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2896 2220 cmd.exe 29 PID 2220 wrote to memory of 2896 2220 cmd.exe 29 PID 2220 wrote to memory of 2896 2220 cmd.exe 29 PID 2896 wrote to memory of 2740 2896 rundll32.exe 30 PID 2896 wrote to memory of 2740 2896 rundll32.exe 30 PID 2896 wrote to memory of 2740 2896 rundll32.exe 30 PID 2896 wrote to memory of 2740 2896 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\src\scrape.py1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\src\scrape.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\src\scrape.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c5f425614af8cb3853ee44ec3765a9bf
SHA1f43bbb55368f2ce0653ea4c3121a15e185e5b015
SHA25660a9d73684f432e3eb2d4ed367b4ce3b9e3872347e59e21be54d49759a758291
SHA51254d651b31b21f2b961d95a91d08900bb309735f9456dbbd23f884d61808d9c49a2c062c47eac908fd978c5a89704a19e935bbe3f8a34f5d4af064fb4aeb7810e