Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1REGFuck-master.zip
windows7-x64
1REGFuck-ma...ignore
windows7-x64
3REGFuck-ma...ICENSE
windows7-x64
1REGFuck-ma...DME.md
windows7-x64
3REGFuck-ma...ck.sln
windows7-x64
3REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm1.cs
windows7-x64
3REGFuck-ma...m1.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm2.js
windows7-x64
3REGFuck-ma...m2.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm3.cs
windows7-x64
3REGFuck-ma...m3.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm4.cs
windows7-x64
3REGFuck-ma...m4.vbs
windows7-x64
1REGFuck-ma...ram.cs
windows7-x64
3REGFuck-ma...nfo.cs
windows7-x64
3REGFuck-ma...er.vbs
windows7-x64
1REGFuck-ma...es.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...ttings
windows7-x64
3REGFuck-ma...csproj
windows7-x64
3REGFuck-ma...ne.jpg
windows7-x64
3REGFuck-ma...ck.png
windows7-x64
3REGFuck-ma...ck.gif
windows7-x64
1REGFuck-ma...ix.gif
windows7-x64
1REGFuck-ma...pp.xml
windows7-x64
1REGFuck-ma...nifest
windows7-x64
3REGFuck-ma...ck.ico
windows7-x64
3Resubmissions
12/10/2024, 12:46
241012-pzt4ba1dmf 312/10/2024, 12:45
241012-pzd24avhqp 312/10/2024, 12:44
241012-pyyeca1dja 112/10/2024, 12:42
241012-pxr6ya1cme 105/08/2024, 23:13
240805-27gt6s1hln 608/07/2024, 16:42
240708-t71chsybln 307/07/2024, 23:47
240707-3svcdssckm 10Analysis
-
max time kernel
1439s -
max time network
1446s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
REGFuck-master.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
REGFuck-master/.gitignore
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
REGFuck-master/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
REGFuck-master/README.md
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
REGFuck-master/RegFuck.sln
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
REGFuck-master/RegFuck/Form1.Designer.cs
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
REGFuck-master/RegFuck/Form1.cs
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
REGFuck-master/RegFuck/Form1.vbs
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
REGFuck-master/RegFuck/Form2.Designer.cs
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
REGFuck-master/RegFuck/Form2.js
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
REGFuck-master/RegFuck/Form2.vbs
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
REGFuck-master/RegFuck/Form3.Designer.cs
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
REGFuck-master/RegFuck/Form3.cs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
REGFuck-master/RegFuck/Form3.vbs
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
REGFuck-master/RegFuck/Form4.Designer.cs
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
REGFuck-master/RegFuck/Form4.cs
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
REGFuck-master/RegFuck/Form4.vbs
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
REGFuck-master/RegFuck/Program.cs
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
REGFuck-master/RegFuck/Properties/AssemblyInfo.cs
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
REGFuck-master/RegFuck/Properties/Resources.Designer.vbs
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
REGFuck-master/RegFuck/Properties/Resources.vbs
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
REGFuck-master/RegFuck/Properties/Settings.Designer.cs
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
REGFuck-master/RegFuck/Properties/Settings.settings
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
REGFuck-master/RegFuck/RegFuck.csproj
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
REGFuck-master/RegFuck/Resources/done.jpg
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
REGFuck-master/RegFuck/Resources/fuck.png
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
REGFuck-master/RegFuck/Resources/hack.gif
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
REGFuck-master/RegFuck/Resources/matrix.gif
Resource
win7-20240508-en
Behavioral task
behavioral29
Sample
REGFuck-master/RegFuck/app.xml
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
REGFuck-master/RegFuck/app.manifest
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
REGFuck-master/RegFuck/regfuck.ico
Resource
win7-20240704-en
General
-
Target
REGFuck-master/RegFuck/Properties/Settings.settings
-
Size
242B
-
MD5
29a2bb6bd6f85ff04804c473e895de92
-
SHA1
48d8aedc9ac54affd627fd9737a0af3ba713f6e4
-
SHA256
baba99193fc1787141063b135424b476ff4151beb833883fcb594631f17c0147
-
SHA512
e2126226fde15a2cbf850824ae9bd2a04910aed905d3f6df366c629890f4ce07404c9fcf30bd41c61c73fb589ff254b8ab328bbddced7640e734098e542bdce2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\settings_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\settings_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.settings\ = "settings_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\settings_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\settings_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\settings_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\settings_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 AcroRd32.exe 2732 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2848 1512 cmd.exe 31 PID 1512 wrote to memory of 2848 1512 cmd.exe 31 PID 1512 wrote to memory of 2848 1512 cmd.exe 31 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Properties\Settings.settings1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Properties\Settings.settings2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck\Properties\Settings.settings"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b3cf9f8365817b121afc9cd3be9d0c7
SHA117d96ef1933dcc543c4c17e86dd0c18d630d5e23
SHA2563aeed5d6995a2db919b1e39dc14aa1a5beceb82a0e6aa2ae35a6c65317320731
SHA51285dc7d90f4078668fc04349d35f83b68e65c0b39957e47145fdcc4524e5733404b59f12162afaed05abfcabb3feb743874bf6461eed746c4b83d1f6baccdd105