Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
314s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 20:51
Behavioral task
behavioral1
Sample
debatabledanger.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
debatabledanger.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
1107143373665607770-leopy.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
1107143373665607770-leopy.pyc
Resource
win10v2004-20240802-en
General
-
Target
1107143373665607770-leopy.pyc
-
Size
81KB
-
MD5
fabd88d59972e62eaeafdd10561e33c2
-
SHA1
327320824336a6623db817f9e4be4effbe725b14
-
SHA256
c61062084df079988f208450d127d0dc51789dfd11f578e262969b6c8ba931e1
-
SHA512
1efafe9fa1e3fd0db74df9b96679aed37e80436ae590fab77ce5361e830f5d67c7adf8316d15cb0682b15351c936d30f4ccd6664795ba4841710fdf0faa2aabf
-
SSDEEP
1536:l1EENJaMGSUVDQX8zJcdlTgAdBW8uptIOO38Z9ETelsJ16T5s8yIlqfqD1P6qsph:HN3cCR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2884 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2884 AcroRd32.exe 2884 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2456 2064 cmd.exe 30 PID 2064 wrote to memory of 2456 2064 cmd.exe 30 PID 2064 wrote to memory of 2456 2064 cmd.exe 30 PID 2456 wrote to memory of 2884 2456 rundll32.exe 31 PID 2456 wrote to memory of 2884 2456 rundll32.exe 31 PID 2456 wrote to memory of 2884 2456 rundll32.exe 31 PID 2456 wrote to memory of 2884 2456 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1107143373665607770-leopy.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1107143373665607770-leopy.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1107143373665607770-leopy.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fd58d20310686c7e35479743250d79c3
SHA1919d31baf58ddba41cefb9d71fb228a84e0aaac9
SHA256d48b8d73ebec1eab6aabb3eb52525e221c0f0d996776212058fa337c2b5dc203
SHA51255c57b7b015e85efc6b43c1a38817b103d53781b957f67614d10a98f02a02aa27d8d68e1f4e4d065b2cf8a7590ee2e64f092e2cd8a278d6c804e24265c652cb2