Overview
overview
7Static
static
3TrianPatch.zip
windows7-x64
1TrianPatch.zip
windows10-2004-x64
1TrianityRe...xclude
windows7-x64
1TrianityRe...xclude
windows10-2004-x64
1TrianityRe...ar.ttf
windows7-x64
3TrianityRe...ar.ttf
windows10-2004-x64
7TrianityRe....woff2
windows7-x64
3TrianityRe....woff2
windows10-2004-x64
3TrianityRe...LOG.md
windows7-x64
3TrianityRe...LOG.md
windows10-2004-x64
3TrianityRe...ICENSE
windows7-x64
1TrianityRe...ICENSE
windows10-2004-x64
1TrianityRe...DME.md
windows7-x64
3TrianityRe...DME.md
windows10-2004-x64
3TrianityRe...es.txt
windows7-x64
1TrianityRe...es.txt
windows10-2004-x64
1TrianityRe...o.json
windows7-x64
3TrianityRe...o.json
windows10-2004-x64
3TrianityRe...a.json
windows7-x64
3TrianityRe...a.json
windows10-2004-x64
3TrianityRe...on.ttf
windows7-x64
3TrianityRe...on.ttf
windows10-2004-x64
7TrianityRe...js.map
windows7-x64
3TrianityRe...js.map
windows10-2004-x64
3TrianityRe...in.css
windows7-x64
3TrianityRe...in.css
windows10-2004-x64
7TrianityRe...js.map
windows7-x64
3TrianityRe...js.map
windows10-2004-x64
3TrianityRe...ar.css
windows7-x64
3TrianityRe...ar.css
windows10-2004-x64
7TrianityRe...ia.css
windows7-x64
3TrianityRe...ia.css
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
TrianPatch.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
TrianPatch.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
TrianityRelease/bin/Editor/.git/info/exclude
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
TrianityRelease/bin/Editor/.git/info/exclude
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
TrianityRelease/bin/Editor/Fonts/JetBrainsMono-Regular.ttf
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
TrianityRelease/bin/Editor/Fonts/JetBrainsMono-Regular.ttf
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
TrianityRelease/bin/Editor/Fonts/JetBrainsMono-Regular.woff2
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
TrianityRelease/bin/Editor/Fonts/JetBrainsMono-Regular.woff2
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
TrianityRelease/bin/Editor/package/CHANGELOG.md
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
TrianityRelease/bin/Editor/package/CHANGELOG.md
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
TrianityRelease/bin/Editor/package/LICENSE
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
TrianityRelease/bin/Editor/package/LICENSE
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
TrianityRelease/bin/Editor/package/README.md
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
TrianityRelease/bin/Editor/package/README.md
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
TrianityRelease/bin/Editor/package/ThirdPartyNotices.txt
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
TrianityRelease/bin/Editor/package/ThirdPartyNotices.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
TrianityRelease/bin/Editor/package/dev/bundleInfo.json
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
TrianityRelease/bin/Editor/package/dev/bundleInfo.json
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
TrianityRelease/bin/Editor/package/dev/nls.metadata.json
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
TrianityRelease/bin/Editor/package/dev/nls.metadata.json
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
TrianityRelease/bin/Editor/package/dev/vs/base/browser/ui/codicons/codicon/codicon.ttf
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
TrianityRelease/bin/Editor/package/dev/vs/base/browser/ui/codicons/codicon/codicon.ttf
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
TrianityRelease/bin/Editor/package/dev/vs/base/worker/workerMain.js.map
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
TrianityRelease/bin/Editor/package/dev/vs/base/worker/workerMain.js.map
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
TrianityRelease/bin/Editor/package/dev/vs/editor/editor.main.css
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
TrianityRelease/bin/Editor/package/dev/vs/editor/editor.main.css
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
TrianityRelease/bin/Editor/package/dev/vs/editor/editor.main.js.map
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
TrianityRelease/bin/Editor/package/dev/vs/editor/editor.main.js.map
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
TrianityRelease/bin/Editor/package/esm/vs/base/browser/ui/actionbar/actionbar.css
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
TrianityRelease/bin/Editor/package/esm/vs/base/browser/ui/actionbar/actionbar.css
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
TrianityRelease/bin/Editor/package/esm/vs/base/browser/ui/aria/aria.css
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
TrianityRelease/bin/Editor/package/esm/vs/base/browser/ui/aria/aria.css
Resource
win10v2004-20240709-en
General
-
Target
TrianityRelease/bin/Editor/package/dev/vs/editor/editor.main.js.map
-
Size
10.4MB
-
MD5
260fc870d6e52e2f33bc4ce28607410e
-
SHA1
d4fe5edfc7ecbbf2cd9102f134832b6eaec35fb9
-
SHA256
5c79c809b982bdfb26d4c47552be84cb6adc2ac44ae20c94fc142f85a1fd2724
-
SHA512
095068fd8229d400bc8afd8fce392bcd687854114e3e548f55567708393182bf81c9ad1260e171bbfe82c8e4d459b9fb331e2c9484db187aac1b9e4dd5208d5c
-
SSDEEP
49152:LPY7gmgQypl8mEjyYuOADZvwg/bPhXFUUOcpb9Tik7KZhOb2XixX3LnV9mUfdQRa:U7+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\map_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\map_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\map_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.map\ = "map_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\map_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\map_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.map rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\map_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2936 2288 cmd.exe 32 PID 2288 wrote to memory of 2936 2288 cmd.exe 32 PID 2288 wrote to memory of 2936 2288 cmd.exe 32 PID 2936 wrote to memory of 2640 2936 rundll32.exe 33 PID 2936 wrote to memory of 2640 2936 rundll32.exe 33 PID 2936 wrote to memory of 2640 2936 rundll32.exe 33 PID 2936 wrote to memory of 2640 2936 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TrianityRelease\bin\Editor\package\dev\vs\editor\editor.main.js.map1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TrianityRelease\bin\Editor\package\dev\vs\editor\editor.main.js.map2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TrianityRelease\bin\Editor\package\dev\vs\editor\editor.main.js.map"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cfc58fa28078658cc4e07c013b4ef6b5
SHA1b7eb14f56c216f4b8b0daa9e9cbdd5479046bcf6
SHA2567b48eec6d6539aa4b87a8c7167b89eef8806fb9b647ef872b4351acca75e49d8
SHA512d29bcde61b8f6bc80528df4ec6208c3d15e309e9e5a7d2c36fb670982ce8f0ddec8d8f596577ee938085b4b1bff6b245d43447105a37a7f27e78d84dd6dcfd18