Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Electron V3.rar
windows7-x64
3Electron V3.rar
windows10-2004-x64
3Electron V...V3.exe
windows7-x64
7Electron V...V3.exe
windows10-2004-x64
7loader-o.pyc
windows7-x64
3loader-o.pyc
windows10-2004-x64
3Electron V...ee.txt
windows7-x64
1Electron V...ee.txt
windows10-2004-x64
1Electron V...ld.txt
windows7-x64
1Electron V...ld.txt
windows10-2004-x64
1Electron V..._FE.iy
windows7-x64
3Electron V..._FE.iy
windows10-2004-x64
3Analysis
-
max time kernel
12s -
max time network
11s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
Electron V3.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Electron V3.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Electron V3/ElectronV3.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Electron V3/ElectronV3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
loader-o.pyc
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
loader-o.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Electron V3/bin/agree.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Electron V3/bin/agree.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Electron V3/workspace/IY_FE.iy
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Electron V3/workspace/IY_FE.iy
Resource
win10v2004-20240709-en
General
-
Target
loader-o.pyc
-
Size
281KB
-
MD5
dfb79ab8133b2c42bddfd1fab4a8923b
-
SHA1
5c1dedde56e6a19ebc971d6d7eef09b3924ce6cb
-
SHA256
a44f854ce44451a188f7c7dc9a4480978e7bee6cc503077b442419c0dfca7b47
-
SHA512
fca34a88797a13857cc0514fa0bf11ae0d3a2898c0a9296c2c5f4f7946dce86ae4f43bb0ca4f08c27c6b3cbf39e83372b5b8a24fe8b07196561b219d14987d00
-
SSDEEP
1536:aaqk4bvv85VGtCBrEjvF4ponc4TV4lafHjcmY6mwxHTSoni9edpw2YRxFfSLoqou:aaUbvkaKr4FCeTOVxHWup5aOEg2h
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 AcroRd32.exe 2796 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2228 2944 cmd.exe 31 PID 2944 wrote to memory of 2228 2944 cmd.exe 31 PID 2944 wrote to memory of 2228 2944 cmd.exe 31 PID 2228 wrote to memory of 2796 2228 rundll32.exe 32 PID 2228 wrote to memory of 2796 2228 rundll32.exe 32 PID 2228 wrote to memory of 2796 2228 rundll32.exe 32 PID 2228 wrote to memory of 2796 2228 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\loader-o.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\loader-o.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\loader-o.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b8f637d032388c78c03a49212d83c82e
SHA16f168bdc274758ae90ebdb1e7c01b1dbf985cc19
SHA256ff70460e7e740c08c83f641e246ad765c4640bb5b370d6e04b767127775f2f4a
SHA5129b7fc0b9675670a62bf33bf4a5902c688c9a11454f5b4ec307d9f69a5587037eacbb6b610925e8608ff81e71bd4c2a6a434bc2f23ea8bfee376400e49259680a