Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
Scorpix-ExecutorV2.12.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Scorpix-ExecutorV2.12.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
loader-o.pyc
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
loader-o.pyc
Resource
win10v2004-20240709-en
General
-
Target
loader-o.pyc
-
Size
359KB
-
MD5
a9b0a53e3a7a32810be93e9df5acee6f
-
SHA1
34eef1ad6131217e1a96c819e3e83248861e4526
-
SHA256
56f6b7f752fd5962008008a5a7cbfbf869144456d613a0bf236a87b7daaf5990
-
SHA512
2a042e954015c48931cf91528c299ab9521f75bfc5703e5c6455570ae9a75ba5ea5fd7556ba1d490b5e4454ba670e6b733724216c46bfedae128c0967f0e8206
-
SSDEEP
1536:Iy6Dbcymg/uKf/owMyNQvCLsn3j5FlSmHYgm9mCVnqVeSrtlmUkkxUsjew+rvhq/:IyIb80GwL7LnLY2Tll2CLGy0GHBMB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2016 1996 cmd.exe 31 PID 1996 wrote to memory of 2016 1996 cmd.exe 31 PID 1996 wrote to memory of 2016 1996 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\loader-o.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\loader-o.pyc2⤵
- Modifies registry class
PID:2016
-