Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1REGFuck-master.zip
windows7-x64
1REGFuck-ma...ignore
windows7-x64
3REGFuck-ma...ICENSE
windows7-x64
1REGFuck-ma...DME.md
windows7-x64
3REGFuck-ma...ck.sln
windows7-x64
3REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm1.cs
windows7-x64
3REGFuck-ma...m1.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm2.js
windows7-x64
3REGFuck-ma...m2.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm3.cs
windows7-x64
3REGFuck-ma...m3.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm4.cs
windows7-x64
3REGFuck-ma...m4.vbs
windows7-x64
1REGFuck-ma...ram.cs
windows7-x64
3REGFuck-ma...nfo.cs
windows7-x64
3REGFuck-ma...er.vbs
windows7-x64
1REGFuck-ma...es.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...ttings
windows7-x64
3REGFuck-ma...csproj
windows7-x64
3REGFuck-ma...ne.jpg
windows7-x64
3REGFuck-ma...ck.png
windows7-x64
3REGFuck-ma...ck.gif
windows7-x64
1REGFuck-ma...ix.gif
windows7-x64
1REGFuck-ma...pp.xml
windows7-x64
1REGFuck-ma...nifest
windows7-x64
3REGFuck-ma...ck.ico
windows7-x64
3Resubmissions
12/10/2024, 12:46
241012-pzt4ba1dmf 312/10/2024, 12:45
241012-pzd24avhqp 312/10/2024, 12:44
241012-pyyeca1dja 112/10/2024, 12:42
241012-pxr6ya1cme 105/08/2024, 23:13
240805-27gt6s1hln 608/07/2024, 16:42
240708-t71chsybln 307/07/2024, 23:47
240707-3svcdssckm 10Analysis
-
max time kernel
1559s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
REGFuck-master.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
REGFuck-master/.gitignore
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
REGFuck-master/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
REGFuck-master/README.md
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
REGFuck-master/RegFuck.sln
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
REGFuck-master/RegFuck/Form1.Designer.cs
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
REGFuck-master/RegFuck/Form1.cs
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
REGFuck-master/RegFuck/Form1.vbs
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
REGFuck-master/RegFuck/Form2.Designer.cs
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
REGFuck-master/RegFuck/Form2.js
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
REGFuck-master/RegFuck/Form2.vbs
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
REGFuck-master/RegFuck/Form3.Designer.cs
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
REGFuck-master/RegFuck/Form3.cs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
REGFuck-master/RegFuck/Form3.vbs
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
REGFuck-master/RegFuck/Form4.Designer.cs
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
REGFuck-master/RegFuck/Form4.cs
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
REGFuck-master/RegFuck/Form4.vbs
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
REGFuck-master/RegFuck/Program.cs
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
REGFuck-master/RegFuck/Properties/AssemblyInfo.cs
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
REGFuck-master/RegFuck/Properties/Resources.Designer.vbs
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
REGFuck-master/RegFuck/Properties/Resources.vbs
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
REGFuck-master/RegFuck/Properties/Settings.Designer.cs
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
REGFuck-master/RegFuck/Properties/Settings.settings
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
REGFuck-master/RegFuck/RegFuck.csproj
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
REGFuck-master/RegFuck/Resources/done.jpg
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
REGFuck-master/RegFuck/Resources/fuck.png
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
REGFuck-master/RegFuck/Resources/hack.gif
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
REGFuck-master/RegFuck/Resources/matrix.gif
Resource
win7-20240508-en
Behavioral task
behavioral29
Sample
REGFuck-master/RegFuck/app.xml
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
REGFuck-master/RegFuck/app.manifest
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
REGFuck-master/RegFuck/regfuck.ico
Resource
win7-20240704-en
General
-
Target
REGFuck-master/RegFuck/Properties/Settings.Designer.cs
-
Size
1KB
-
MD5
b8197a1acf364ea4d5a980478022bf19
-
SHA1
8fa903d2cb84b8f635f80a61d766bca5a405bf28
-
SHA256
dd57a57b1732dee3a7f73cf5c09842caab8b0ae148031feeb0f966ed62a785f6
-
SHA512
92f40619871d2339683fd7009c90e097cfd3122a8a0966588713974000e7673e88c2d99851767bd5be1317511ef2f3b664d588357b20e93603b803c60076fcec
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2172 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2172 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2172 AcroRd32.exe 2172 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2172 1620 cmd.exe 31 PID 1620 wrote to memory of 2172 1620 cmd.exe 31 PID 1620 wrote to memory of 2172 1620 cmd.exe 31 PID 1620 wrote to memory of 2172 1620 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Properties\Settings.Designer.cs1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Properties\Settings.Designer.cs"2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5323ce5fdc51dced23ba024f777881c5b
SHA1fcf81e24daf55dd13eb70cfba78eece0a74e697d
SHA2565c0d76017b33f0c8ace03057373d521aaa6f9659e91fee7f17c8b038362c37b9
SHA512150296fb568c79b8d324256c65029345545d05daefe202c771a7113dfb4083ff6076c968cf948163c0eadb93eb0418334c513d82cda1983663927ad9b104d7b3