Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
844s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
jacksmith_backup (1).papa
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
jacksmith_backup (1).papa
Resource
win10v2004-20240426-en
General
-
Target
jacksmith_backup (1).papa
-
Size
1KB
-
MD5
08159d4fa028b36919299fc886933b04
-
SHA1
720e94f19f50167b57b2ad0176b034d8df19a04d
-
SHA256
9e0cfeb3e5258c6c3eeb63510b11e149b682570493fa17dd73eb227816fbeb2b
-
SHA512
2968e6e0d661838d39a73509b2b539d1d6524e7ca4abfe7b3e7f4fc33f1d8a1d4bbfd52d3c40c503dd6ebc3247528a94533fcd3a33bdd5231574f7b1b2392d72
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\papa_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\papa_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\papa_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.papa rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\papa_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.papa\ = "papa_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\papa_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\papa_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2872 2356 cmd.exe 29 PID 2356 wrote to memory of 2872 2356 cmd.exe 29 PID 2356 wrote to memory of 2872 2356 cmd.exe 29 PID 2872 wrote to memory of 2748 2872 rundll32.exe 30 PID 2872 wrote to memory of 2748 2872 rundll32.exe 30 PID 2872 wrote to memory of 2748 2872 rundll32.exe 30 PID 2872 wrote to memory of 2748 2872 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\jacksmith_backup (1).papa"1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\jacksmith_backup (1).papa2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\jacksmith_backup (1).papa"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5adf1d764ea7ddf370b1b733a33f5e49d
SHA1934391936ec109327327206e3a9f928f2e85048f
SHA256f4c1669ccc6d55639c8e2f9896a27c54f41fe87baa528db20190dab09da6b6ce
SHA5124fc494bbc2789daa4a88ec665bb2f0d1e15f1353032cb00a3693239aa8b4ae6f4cc8e9f42863dddfe4b6457cef86634c3feaf98c935aff2427ada7d062e2bf1a