Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 14:13
Behavioral task
behavioral1
Sample
builded.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
builded.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
build.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
build.pyc
Resource
win10v2004-20240426-en
General
-
Target
build.pyc
-
Size
64KB
-
MD5
40c03899b664e90df6e9c2db8bd3471a
-
SHA1
395b49a0410a25a5d09870b6f394ebb3a9a62b7f
-
SHA256
f82d7ed28482ec77cb92635fe90a70959394a4cc6fa29d0fac5d0e3c062b9455
-
SHA512
2b678035641d0661d74d893746d6e0a5a99987ca60666c7500f755f2b59793b2ae3477f02726a35d4d803ca25b8ffb5903d85f28095366b04e7785b5da949cc9
-
SSDEEP
1536:7CrQqe+0Ql9pObo8BHWftlx7HFHOW98VgeOR2eP:7CrYbo8B2VlxTVHMgeORH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4044 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 4044 OpenWith.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4044 wrote to memory of 2464 4044 OpenWith.exe 91 PID 4044 wrote to memory of 2464 4044 OpenWith.exe 91 PID 4044 wrote to memory of 2464 4044 OpenWith.exe 91
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\build.pyc1⤵
- Modifies registry class
PID:3640
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\build.pyc"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2464
-