Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1env.sh
ubuntu-18.04-amd64
1env.sh
debian-9-armhf
1env.sh
debian-9-mips
env.sh
debian-9-mipsel
health-record.sh
ubuntu-18.04-amd64
1health-record.sh
debian-9-armhf
1health-record.sh
debian-9-mips
health-record.sh
debian-9-mipsel
post-install.sh
ubuntu-18.04-amd64
1post-install.sh
debian-9-armhf
1post-install.sh
debian-9-mips
post-install.sh
debian-9-mipsel
post-uninstall.sh
ubuntu-18.04-amd64
1post-uninstall.sh
debian-9-armhf
1post-uninstall.sh
debian-9-mips
post-uninstall.sh
debian-9-mipsel
pre-install.sh
ubuntu-18.04-amd64
1pre-install.sh
debian-9-armhf
1pre-install.sh
debian-9-mips
pre-install.sh
debian-9-mipsel
pre-uninstall.sh
ubuntu-18.04-amd64
1pre-uninstall.sh
debian-9-armhf
1pre-uninstall.sh
debian-9-mips
pre-uninstall.sh
debian-9-mipsel
start-stop.sh
ubuntu-18.04-amd64
1start-stop.sh
debian-9-armhf
1start-stop.sh
debian-9-mips
start-stop.sh
debian-9-mipsel
bin/AsRemo...er.pyc
windows7-x64
3bin/AsRemo...er.pyc
windows10-2004-x64
3bin/asremote-srv.pyc
windows7-x64
3bin/asremote-srv.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
env.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
env.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
env.sh
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
env.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
health-record.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral6
Sample
health-record.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral7
Sample
health-record.sh
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral8
Sample
health-record.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral9
Sample
post-install.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral10
Sample
post-install.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral11
Sample
post-install.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral12
Sample
post-install.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral13
Sample
post-uninstall.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral14
Sample
post-uninstall.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral15
Sample
post-uninstall.sh
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral16
Sample
post-uninstall.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral17
Sample
pre-install.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral18
Sample
pre-install.sh
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral19
Sample
pre-install.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral20
Sample
pre-install.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral21
Sample
pre-uninstall.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral22
Sample
pre-uninstall.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral23
Sample
pre-uninstall.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral24
Sample
pre-uninstall.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral25
Sample
start-stop.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral26
Sample
start-stop.sh
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral27
Sample
start-stop.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral28
Sample
start-stop.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral29
Sample
bin/AsRemoteCommandsHandler.pyc
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
bin/AsRemoteCommandsHandler.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
bin/asremote-srv.pyc
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
bin/asremote-srv.pyc
Resource
win10v2004-20240226-en
General
-
Target
bin/asremote-srv.pyc
-
Size
50KB
-
MD5
54726e45376838ada3efc5435c55be26
-
SHA1
016ee957ec132c9d19afe069ec7705d0c1727703
-
SHA256
48696bc8424f2d59100e609591fcd11e3407d033e518c8cd9b9e07fbfef49553
-
SHA512
f5dec84a9c1777006fceba59a95391740f4cce5e7cec6d25cefebf59770a1119fab0cb4a58f03642f53d19b72598adb575d28ae58a0f45d111a1688710eff7bd
-
SSDEEP
1536:q3RT7IIlgovEoWNV40AGcUIL3x0DkzuajUCQsV+BLEGBS81mD8JJl6qxjaF/Ei6t:EoIlgovEoWNV4XGcUILx0DkzuajUCQsM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 AcroRd32.exe 2616 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2656 2416 cmd.exe 29 PID 2416 wrote to memory of 2656 2416 cmd.exe 29 PID 2416 wrote to memory of 2656 2416 cmd.exe 29 PID 2656 wrote to memory of 2616 2656 rundll32.exe 30 PID 2656 wrote to memory of 2616 2656 rundll32.exe 30 PID 2656 wrote to memory of 2616 2656 rundll32.exe 30 PID 2656 wrote to memory of 2616 2656 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bin\asremote-srv.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bin\asremote-srv.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bin\asremote-srv.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5adcda85ca234d4645c8d6a1fa608c6f6
SHA11574caf02afb0613e565c55ae3280da09877bc52
SHA25683aaf7a3fe12189bb5a4b3c0d8884e037b3df5be28eef080d309315b50cb75ce
SHA512cc32c181a04f3ff5b390a0d417070ce1178be6c638a14e37472b6fec69ec5c46d1e2f490595b1449ca16ae89b520580f4a78c8c54b1dc97d4f440e48d6d5c595