Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
02/08/2024, 19:31
240802-x8r93sxanq 3Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
AtlasPlaybook_v0.4.0.7z
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
AtlasPlaybook_v0.4.0.7z
Resource
win10v2004-20240802-en
General
-
Target
AtlasPlaybook_v0.4.0.7z
-
Size
8.1MB
-
MD5
e703982620f789382d832127d5ae1d65
-
SHA1
f46412e86a469802f877ce7b8dae70708c7fc129
-
SHA256
00b428b84f5bf5cda82943ea83076915d324bd0002458c7aa391afbc857b8e5a
-
SHA512
08d52d2492924c4d493c803c58ac091c0de8c9646d3ca6fff777e7875af94d55476a102328ceb7a01b684bd797a00c9ff5bc40f7da861a7ae37fc7f2720db0e8
-
SSDEEP
196608:5lM4O+bvAZcg+BfeziPMTOdIW7STk4wpczJbL7RVfR9jTMp:5lM4/7ASg+Mzi0TKSbvzJlVffMp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main helppane.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2856 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2900 helppane.exe Token: SeTakeOwnershipPrivilege 2900 helppane.exe Token: SeTakeOwnershipPrivilege 2900 helppane.exe Token: SeTakeOwnershipPrivilege 2900 helppane.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 helppane.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1892 AcroRd32.exe 1892 AcroRd32.exe 2900 helppane.exe 2900 helppane.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2856 2116 cmd.exe 31 PID 2116 wrote to memory of 2856 2116 cmd.exe 31 PID 2116 wrote to memory of 2856 2116 cmd.exe 31 PID 2856 wrote to memory of 2708 2856 rundll32.exe 32 PID 2856 wrote to memory of 2708 2856 rundll32.exe 32 PID 2856 wrote to memory of 2708 2856 rundll32.exe 32 PID 2708 wrote to memory of 1892 2708 rundll32.exe 34 PID 2708 wrote to memory of 1892 2708 rundll32.exe 34 PID 2708 wrote to memory of 1892 2708 rundll32.exe 34 PID 2708 wrote to memory of 1892 2708 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AtlasPlaybook_v0.4.0.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AtlasPlaybook_v0.4.0.7z2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AtlasPlaybook_v0.4.0.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AtlasPlaybook_v0.4.0.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
-
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2900