Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3VULNERA V3.zip
windows7-x64
1VULNERA V3.zip
windows10-2004-x64
1CeleryIn.dll
windows7-x64
1CeleryIn.dll
windows10-2004-x64
1CeleryInject.exe
windows7-x64
1CeleryInject.exe
windows10-2004-x64
1EVERYTHING.exe
windows7-x64
1EVERYTHING.exe
windows10-2004-x64
1EVERYTHING.exe.config
windows7-x64
3EVERYTHING.exe.config
windows10-2004-x64
3EVERYTHING.pdb
windows7-x64
3EVERYTHING.pdb
windows10-2004-x64
3STAPI.dll
windows7-x64
1STAPI.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
VULNERA V3.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
VULNERA V3.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
CeleryIn.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
CeleryIn.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
CeleryInject.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CeleryInject.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
EVERYTHING.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
EVERYTHING.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
EVERYTHING.exe.config
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
EVERYTHING.exe.config
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
EVERYTHING.pdb
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
EVERYTHING.pdb
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
STAPI.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
STAPI.dll
Resource
win10v2004-20240709-en
General
-
Target
EVERYTHING.pdb
-
Size
41KB
-
MD5
6a5b4ea5db6629a678cfbab8dd6ebe27
-
SHA1
aca68668e49f0d8fd10ef8ad385fab4853a42704
-
SHA256
cda489b66c5b6c6c4821eee89d7ae075f34aca5af06376fb7eda132e3c5bac6d
-
SHA512
04218fc3f0f36c92aefb34279baeaa6e1744b1be3ef734e50b8775778edb580780c0fcef85f75e18ffcf6a225560185a70c9a9c4a0f25881f110b6ecfa97da43
-
SSDEEP
384:PnbwAbwx1dvs5c4SECbHzuXpPSDl2ECbkUgmL1dvsaZ:PnbwAbwx1dvs5MUCtFs1dvsa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2100 OpenWith.exe