Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3nokia s40/Micat.jad
windows7-x64
3nokia s40/Micat.jad
windows10-2004-x64
3nokia s40/Micat.jad
windows7-x64
3nokia s40/Micat.jad
windows10-2004-x64
3nokia s40/...��.url
windows7-x64
1nokia s40/...��.url
windows10-2004-x64
1000Micat.exe
windows7-x64
3000Micat.exe
windows10-2004-x64
7000Micat.exe
windows7-x64
3000Micat.exe
windows10-2004-x64
7咪客适�...��.xls
windows7-x64
1咪客适�...��.xls
windows10-2004-x64
1索爱k750...at.jad
windows7-x64
3索爱k750...at.jad
windows10-2004-x64
3索爱k750...at.jad
windows7-x64
3索爱k750...at.jad
windows10-2004-x64
3索爱k790...at.jad
windows7-x64
3索爱k790...at.jad
windows10-2004-x64
3索爱k790...at.jad
windows7-x64
3索爱k790...at.jad
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
nokia s40/Micat.jad
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
nokia s40/Micat.jad
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
nokia s40/Micat.jad
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
nokia s40/Micat.jad
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
nokia s40/新云软件.url
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
nokia s40/新云软件.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
000Micat.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
000Micat.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
000Micat.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
000Micat.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
咪客适配机型表2008年4月21日.xls
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
咪客适配机型表2008年4月21日.xls
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
索爱k750系列/Micat.jad
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
索爱k750系列/Micat.jad
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
索爱k750系列/Micat.jad
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
索爱k750系列/Micat.jad
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
索爱k790系列/Micat.jad
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
索爱k790系列/Micat.jad
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
索爱k790系列/Micat.jad
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
索爱k790系列/Micat.jad
Resource
win10v2004-20240611-en
General
-
Target
索爱k790系列/Micat.jad
-
Size
4KB
-
MD5
0791c630eb98c1aa426196ea43ea0583
-
SHA1
62d9bd055746825cce2c7e798f258519d72bbcd6
-
SHA256
43662982349334276e6cb2458f04c2c739cf36facb49a0c199396ccfd87aa94a
-
SHA512
c03af147f47e98a80dea2db6a3f5ef2b5433eac5d9079ae14dff196ca186109d311af7fcc48f29d140f0d86712011db465eec8ed16d23312901e33825dd5c8e8
-
SSDEEP
96:Wk08mo30FIgDFwIJ9armT0DA8SFwIb34/bKVU21fnXCvNjsyR:uNOgDFwIJ9armgDA8SFwIb3wbKDFup
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\jad_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2560 2964 cmd.exe 29 PID 2964 wrote to memory of 2560 2964 cmd.exe 29 PID 2964 wrote to memory of 2560 2964 cmd.exe 29 PID 2560 wrote to memory of 2588 2560 rundll32.exe 30 PID 2560 wrote to memory of 2588 2560 rundll32.exe 30 PID 2560 wrote to memory of 2588 2560 rundll32.exe 30 PID 2560 wrote to memory of 2588 2560 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\索爱k790系列\Micat.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\索爱k790系列\Micat.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\索爱k790系列\Micat.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD521e1b4e6be1432bb19f0f9bc4a4a8768
SHA191fbc94c9716cec59fbfb6a44500c8e40b0f0b97
SHA25646ba229d3289144ebdd1c8ce96b831f189e759789ad3907c0168287dc2e12c9c
SHA5126e214e6d2121bb831617f74f1eb0ce7c6b4852b3a7383c1b19305f49f821cf53826405835f8d5d35e82bc05c1a3e70c37f2f744cc7e0036946910f9f46c64a61