Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
8CollapseLo...in.ps1
windows7-x64
3CollapseLo...der.py
windows7-x64
3CollapseLo...ain.py
windows7-x64
3CollapseLo...API.py
windows7-x64
3CollapseLo...eat.py
windows7-x64
3CollapseLo...ner.py
windows7-x64
3CollapseLo...ats.py
windows7-x64
3CollapseLo...ata.py
windows7-x64
3CollapseLo...eat.py
windows7-x64
3CollapseLo...ker.py
windows7-x64
3CollapseLo...ger.py
windows7-x64
3CollapseLo...ogo.py
windows7-x64
3CollapseLo...ger.py
windows7-x64
3CollapseLo...RPC.py
windows7-x64
3CollapseLo...try.py
windows7-x64
3CollapseLo...tor.py
windows7-x64
3CollapseLo...ngs.py
windows7-x64
3CollapseLo...ter.py
windows7-x64
3CollapseLo...run.py
windows7-x64
3CollapseLo...cd.ps1
windows7-x64
3CollapseLo...cd.ps1
windows7-x64
3CollapseLo...px.exe
windows7-x64
7Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 16:40
Behavioral task
behavioral1
Sample
CollapseLoader-1.2.5/.github/workflows/main.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CollapseLoader-1.2.5/builder.py
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
CollapseLoader-1.2.5/collapse/main.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
CollapseLoader-1.2.5/collapse/utils/API.py
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
CollapseLoader-1.2.5/collapse/utils/Cheat.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
CollapseLoader-1.2.5/collapse/utils/CheatCleaner.py
Resource
win7-20240215-en
Behavioral task
behavioral7
Sample
CollapseLoader-1.2.5/collapse/utils/Cheats.py
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
CollapseLoader-1.2.5/collapse/utils/Data.py
Resource
win7-20240419-en
Behavioral task
behavioral9
Sample
CollapseLoader-1.2.5/collapse/utils/Fabric/FabricCheat.py
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
CollapseLoader-1.2.5/collapse/utils/LogChecker.py
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
CollapseLoader-1.2.5/collapse/utils/Logger.py
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
CollapseLoader-1.2.5/collapse/utils/Logo.py
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
CollapseLoader-1.2.5/collapse/utils/ModManager.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
CollapseLoader-1.2.5/collapse/utils/RPC.py
Resource
win7-20240220-en
Behavioral task
behavioral15
Sample
CollapseLoader-1.2.5/collapse/utils/Registry.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
CollapseLoader-1.2.5/collapse/utils/Selector.py
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
CollapseLoader-1.2.5/collapse/utils/Settings.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
CollapseLoader-1.2.5/collapse/utils/Updater.py
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
CollapseLoader-1.2.5/run.py
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
CollapseLoader-1.2.5/scripts/ci_cd.ps1
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
CollapseLoader-1.2.5/scripts/un_ci_cd.ps1
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
CollapseLoader-1.2.5/upx/upx.exe
Resource
win7-20240221-en
General
-
Target
CollapseLoader-1.2.5/builder.py
-
Size
983B
-
MD5
f05a99f0f3635629b2da3b10b1b06dc6
-
SHA1
071de0ebf8700ced13ae0f9c0ce2570a5b26476d
-
SHA256
0aa3210af640879efe2222b1a28aed0c39e8a8f505f19064f85415dba05b6e7e
-
SHA512
9d3f2b0860fa2c3af8f85393490d37148543bbf973564751fc1c911e4271ea972e2b9e34e73aeae40fc35a0b9bc45ad01da604e2621a2d29491e12d035ead073
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2076 AcroRd32.exe 2076 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2748 2256 cmd.exe 29 PID 2256 wrote to memory of 2748 2256 cmd.exe 29 PID 2256 wrote to memory of 2748 2256 cmd.exe 29 PID 2748 wrote to memory of 2076 2748 rundll32.exe 30 PID 2748 wrote to memory of 2076 2748 rundll32.exe 30 PID 2748 wrote to memory of 2076 2748 rundll32.exe 30 PID 2748 wrote to memory of 2076 2748 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\builder.py1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\builder.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\builder.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ef37ade8cbf9a9547e3188c777213906
SHA14d034eac3ddf7ba69154b884f11538783c7b3e62
SHA25609149439fea85de919e7b0c24736ed1b1f33d52d13384aff366fd6054934713b
SHA512cc7bbecb233ae198f176c3c5a218c9e1a1d429f700f1f2e9ea53dcc6e6afa02a634881fe304e7b4da98982771664d49febcb9f13a66d7492f2d8fc0bfaf7de78