Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ANDROID_RAT.rar
windows7-x64
3ANDROID_RAT.rar
windows10-2004-x64
3ANDROID RA... 1.exe
windows7-x64
7ANDROID RA... 1.exe
windows10-2004-x64
7Creal.pyc
windows7-x64
3Creal.pyc
windows10-2004-x64
3ANDROID RA...er.exe
windows7-x64
7ANDROID RA...er.exe
windows10-2004-x64
7Creal.pyc
windows7-x64
3Creal.pyc
windows10-2004-x64
3ANDROID RA...me.txt
windows7-x64
1ANDROID RA...me.txt
windows10-2004-x64
1ANDROID RA...st.bat
windows7-x64
1ANDROID RA...st.bat
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 07:53
Behavioral task
behavioral1
Sample
ANDROID_RAT.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ANDROID_RAT.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
ANDROID RAT/Build 1.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ANDROID RAT/Build 1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Creal.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Creal.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
ANDROID RAT/Compiler.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
ANDROID RAT/Compiler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Creal.pyc
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Creal.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
ANDROID RAT/Readme.txt
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
ANDROID RAT/Readme.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
ANDROID RAT/Run first.bat
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
ANDROID RAT/Run first.bat
Resource
win10v2004-20240709-en
General
-
Target
Creal.pyc
-
Size
105KB
-
MD5
33c413274d516b542d7372f3b5d09eaf
-
SHA1
cad7903b7819be3e029c59b7b99de195d1f7ffcd
-
SHA256
e257b0f127b87920205378556cbdede58dd72064d73835f1c8335a930416a042
-
SHA512
7abcbb6472e30ed9fe31ca5aa08036c948d58983d2942b3b971fb76d62ee1c6effce16cd3c3246093f52cc14ecee2a641830751bdcca9d8cf6b5f1e43ba2876e
-
SSDEEP
1536:oSreO/J2vY5DA1y5ZvbZb8y0M5V49pCJlkpMkEQQU5Eyk7:oSCO/JYM3vbulrCJlki4j5Eyq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1236 AcroRd32.exe 1236 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1924 2116 cmd.exe 31 PID 2116 wrote to memory of 1924 2116 cmd.exe 31 PID 2116 wrote to memory of 1924 2116 cmd.exe 31 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50253225c3a1696a19407ef3c2d59bf03
SHA11fd398eebe1911417a0cb736e4d1c7540b959280
SHA2569c6fb5326a69964d7718ec524318faf93a53bd13cf7020ca9b7b266c7ff3dbe4
SHA5129c5a3c5918bd480e621c2b9d9c802d05e2d6397d16b2b5b3c0895290ca2ea0a026b25f6b2420171dbc1ad594ecaf4a285f962bbbdb4568f9ec529f3a691014b6