Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Built.rar
windows7-x64
3Built.rar
windows10-2004-x64
3Built/DoxT..._0.exe
windows7-x64
1Built/DoxT..._0.exe
windows10-2004-x64
7Built/Guna.UI2.dll
windows7-x64
1Built/Guna.UI2.dll
windows10-2004-x64
1Built/Html...ck.dll
windows7-x64
1Built/Html...ck.dll
windows10-2004-x64
1Built/Newt...on.dll
windows7-x64
1Built/Newt...on.dll
windows10-2004-x64
1Built/RestSharp.dll
windows7-x64
1Built/RestSharp.dll
windows10-2004-x64
1Built/Syst...nt.dll
windows7-x64
1Built/Syst...nt.dll
windows10-2004-x64
1Built/osint.deps.json
windows7-x64
3Built/osint.deps.json
windows10-2004-x64
3Built/osint.exe
windows7-x64
1Built/osint.exe
windows10-2004-x64
1Built/osint.pdb
windows7-x64
3Built/osint.pdb
windows10-2004-x64
3Built/osin...g.json
windows7-x64
3Built/osin...g.json
windows10-2004-x64
3Built/runt...nt.dll
windows7-x64
1Built/runt...nt.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 23:23
Behavioral task
behavioral1
Sample
Built.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Built.rar
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Built/DoxTool By R_0.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Built/DoxTool By R_0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Built/Guna.UI2.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Built/Guna.UI2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Built/HtmlAgilityPack.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Built/HtmlAgilityPack.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
Built/Newtonsoft.Json.dll
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
Built/Newtonsoft.Json.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Built/RestSharp.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
Built/RestSharp.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Built/System.Management.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Built/System.Management.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Built/osint.deps.json
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Built/osint.deps.json
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
Built/osint.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
Built/osint.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Built/osint.pdb
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Built/osint.pdb
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
Built/osint.runtimeconfig.json
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Built/osint.runtimeconfig.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Built/runtimes/win/lib/net7.0/System.Management.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
Built/runtimes/win/lib/net7.0/System.Management.dll
Resource
win10v2004-20240508-en
General
-
Target
Built/osint.deps.json
-
Size
39KB
-
MD5
707b1c4f3117af74ae55e9e243d0ecc3
-
SHA1
cea67d8eb77c1bf8f597265677d4036728ee10c5
-
SHA256
1e0f3e7a3a44b3e108dd684fc7e181ccc3320dd4b8daa4ff7894e63ddbd88c00
-
SHA512
d286509d1eb1522c3c6f5ca5498b76b5ec32f48a4630e61085ee27426b76023f4d2bca6ac3b294267a5c879d32dcde6e4ebf6e029e60976826421808b4d03efc
-
SSDEEP
384:C+KetokiOGwMl7JIuRmkzbbjGgtsxxqqgk5VSte6E5sO+wH3HvQtqO3zIC1mxIr9:CIABRpbPGgCnPScH3HItqO3zIC2Gzn3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 AcroRd32.exe 2816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2732 1868 cmd.exe 29 PID 1868 wrote to memory of 2732 1868 cmd.exe 29 PID 1868 wrote to memory of 2732 1868 cmd.exe 29 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Built\osint.deps.json1⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Built\osint.deps.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Built\osint.deps.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b966b287d9510fe58a0cf87489eeba39
SHA1a31de5b3c2d2bce0987791162fa6aca690be6183
SHA2564eef96a7b212ba77a03549f3fbb855ff1c4e0ec298791663365ef84a80a4c11a
SHA51234e73105a75727196529a5073fb4e3a96409ef66966a7b332f0a0a50a78b263b6e3ebf905fdfab7b6d9ba5414b0a9c688208113ab4d31fe21a2e7d197a058f9d