Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1REGFuck-master.zip
windows7-x64
1REGFuck-ma...ignore
windows7-x64
3REGFuck-ma...ICENSE
windows7-x64
1REGFuck-ma...DME.md
windows7-x64
3REGFuck-ma...ck.sln
windows7-x64
3REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm1.cs
windows7-x64
3REGFuck-ma...m1.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm2.js
windows7-x64
3REGFuck-ma...m2.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm3.cs
windows7-x64
3REGFuck-ma...m3.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...rm4.cs
windows7-x64
3REGFuck-ma...m4.vbs
windows7-x64
1REGFuck-ma...ram.cs
windows7-x64
3REGFuck-ma...nfo.cs
windows7-x64
3REGFuck-ma...er.vbs
windows7-x64
1REGFuck-ma...es.vbs
windows7-x64
1REGFuck-ma...ner.cs
windows7-x64
3REGFuck-ma...ttings
windows7-x64
3REGFuck-ma...csproj
windows7-x64
3REGFuck-ma...ne.jpg
windows7-x64
3REGFuck-ma...ck.png
windows7-x64
3REGFuck-ma...ck.gif
windows7-x64
1REGFuck-ma...ix.gif
windows7-x64
1REGFuck-ma...pp.xml
windows7-x64
1REGFuck-ma...nifest
windows7-x64
3REGFuck-ma...ck.ico
windows7-x64
3Resubmissions
12/10/2024, 12:46
241012-pzt4ba1dmf 312/10/2024, 12:45
241012-pzd24avhqp 312/10/2024, 12:44
241012-pyyeca1dja 112/10/2024, 12:42
241012-pxr6ya1cme 105/08/2024, 23:13
240805-27gt6s1hln 608/07/2024, 16:42
240708-t71chsybln 307/07/2024, 23:47
240707-3svcdssckm 10Analysis
-
max time kernel
1559s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
REGFuck-master.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
REGFuck-master/.gitignore
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
REGFuck-master/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
REGFuck-master/README.md
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
REGFuck-master/RegFuck.sln
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
REGFuck-master/RegFuck/Form1.Designer.cs
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
REGFuck-master/RegFuck/Form1.cs
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
REGFuck-master/RegFuck/Form1.vbs
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
REGFuck-master/RegFuck/Form2.Designer.cs
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
REGFuck-master/RegFuck/Form2.js
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
REGFuck-master/RegFuck/Form2.vbs
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
REGFuck-master/RegFuck/Form3.Designer.cs
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
REGFuck-master/RegFuck/Form3.cs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
REGFuck-master/RegFuck/Form3.vbs
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
REGFuck-master/RegFuck/Form4.Designer.cs
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
REGFuck-master/RegFuck/Form4.cs
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
REGFuck-master/RegFuck/Form4.vbs
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
REGFuck-master/RegFuck/Program.cs
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
REGFuck-master/RegFuck/Properties/AssemblyInfo.cs
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
REGFuck-master/RegFuck/Properties/Resources.Designer.vbs
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
REGFuck-master/RegFuck/Properties/Resources.vbs
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
REGFuck-master/RegFuck/Properties/Settings.Designer.cs
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
REGFuck-master/RegFuck/Properties/Settings.settings
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
REGFuck-master/RegFuck/RegFuck.csproj
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
REGFuck-master/RegFuck/Resources/done.jpg
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
REGFuck-master/RegFuck/Resources/fuck.png
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
REGFuck-master/RegFuck/Resources/hack.gif
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
REGFuck-master/RegFuck/Resources/matrix.gif
Resource
win7-20240508-en
Behavioral task
behavioral29
Sample
REGFuck-master/RegFuck/app.xml
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
REGFuck-master/RegFuck/app.manifest
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
REGFuck-master/RegFuck/regfuck.ico
Resource
win7-20240704-en
General
-
Target
REGFuck-master/RegFuck.sln
-
Size
966B
-
MD5
74328392a08135199b27d0430bd57bcb
-
SHA1
df20f6f566e0a87676e93f7e44950e3d3402f9c0
-
SHA256
b40e94f00ffc0902d0d7da554d48640597036cbe9bd8a6f6ba1dc32d0c22bae8
-
SHA512
dfaa5169c42633f623e43fc011d6befa40cb112603cf6450e1027d5cbaf5ccc6be093a438324a11db65fd26ca5eca417642d34fbce6184abd268a81e2fdb72e1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\sln_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\sln_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\sln_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\sln_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.sln rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.sln\ = "sln_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\sln_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\sln_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2896 AcroRd32.exe 2896 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1988 2388 cmd.exe 31 PID 2388 wrote to memory of 1988 2388 cmd.exe 31 PID 2388 wrote to memory of 1988 2388 cmd.exe 31 PID 1988 wrote to memory of 2896 1988 rundll32.exe 33 PID 1988 wrote to memory of 2896 1988 rundll32.exe 33 PID 1988 wrote to memory of 2896 1988 rundll32.exe 33 PID 1988 wrote to memory of 2896 1988 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck.sln1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck.sln2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\REGFuck-master\RegFuck.sln"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5483c6860362a1c829a3456421600d9b2
SHA1ebf5c9fc4c3f3a54ff0db9d39a5d192558857b16
SHA256f0719c114af651eceb6fc8d45189b4f91b0f98534610f2305407a94fc927442c
SHA512339c201966b198a57a3f94bc11400757809293d0e412f1bfc8850e577990775805e13e7da8580c36ca6e81b075851430f49bca8acf8453040a365ee6d869c07f