Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
4Static
static
1celery-api...EST.in
windows7-x64
3celery-api...EST.in
windows10-2004-x64
3celery-api...G-INFO
windows7-x64
1celery-api...G-INFO
windows10-2004-x64
3celery-api...ME.rst
windows7-x64
3celery-api...ME.rst
windows10-2004-x64
3celery-api...G-INFO
windows7-x64
1celery-api...G-INFO
windows10-2004-x64
celery-api...ES.txt
windows7-x64
1celery-api...ES.txt
windows10-2004-x64
1celery-api...ks.txt
windows7-x64
1celery-api...ks.txt
windows10-2004-x64
1celery-api...es.txt
windows7-x64
1celery-api...es.txt
windows10-2004-x64
1celery-api...el.txt
windows7-x64
1celery-api...el.txt
windows10-2004-x64
1celery-api...api.py
windows7-x64
3celery-api...api.py
windows10-2004-x64
3celery-api...up.cfg
windows7-x64
3celery-api...up.cfg
windows10-2004-x64
3celery-api...tup.py
windows7-x64
4celery-api...tup.py
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
celery-api-0.1/MANIFEST.in
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
celery-api-0.1/MANIFEST.in
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
celery-api-0.1/PKG-INFO
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
celery-api-0.1/PKG-INFO
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
celery-api-0.1/README.rst
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
celery-api-0.1/README.rst
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
celery-api-0.1/celery_api.egg-info/PKG-INFO
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
celery-api-0.1/celery_api.egg-info/PKG-INFO
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
celery-api-0.1/celery_api.egg-info/SOURCES.txt
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
celery-api-0.1/celery_api.egg-info/SOURCES.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
celery-api-0.1/celery_api.egg-info/dependency_links.txt
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
celery-api-0.1/celery_api.egg-info/dependency_links.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
celery-api-0.1/celery_api.egg-info/requires.txt
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
celery-api-0.1/celery_api.egg-info/requires.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
celery-api-0.1/celery_api.egg-info/top_level.txt
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
celery-api-0.1/celery_api.egg-info/top_level.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
celery-api-0.1/celery_api.py
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
celery-api-0.1/celery_api.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
celery-api-0.1/setup.cfg
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
celery-api-0.1/setup.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
celery-api-0.1/setup.py
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
celery-api-0.1/setup.py
Resource
win10v2004-20240802-en
General
-
Target
celery-api-0.1/setup.cfg
-
Size
59B
-
MD5
d86758afb08a60bc589dc67bfea670b2
-
SHA1
68140cccea91d3e1c1e21a3416acd5551d0dea45
-
SHA256
063d04b462ef73e9d86e0b0ae49c4321b51984444a5a2a90aece1e0082b488ee
-
SHA512
7b37eaebc05a5d112a7d4bc26b30f304fde7c5edbc892dcdc5be59195d99ed608dfead1372a265efb0f2f68fd4cd7ed764962e216dce99c42e117c2615e84ffd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\cfg_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.cfg rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.cfg\ = "cfg_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\cfg_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\cfg_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\cfg_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\cfg_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\cfg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2892 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2892 AcroRd32.exe 2892 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2840 2264 cmd.exe 30 PID 2264 wrote to memory of 2840 2264 cmd.exe 30 PID 2264 wrote to memory of 2840 2264 cmd.exe 30 PID 2840 wrote to memory of 2892 2840 rundll32.exe 31 PID 2840 wrote to memory of 2892 2840 rundll32.exe 31 PID 2840 wrote to memory of 2892 2840 rundll32.exe 31 PID 2840 wrote to memory of 2892 2840 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\celery-api-0.1\setup.cfg1⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\celery-api-0.1\setup.cfg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\celery-api-0.1\setup.cfg"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5040ac89a805222428500e8026ed20325
SHA141a2caa33be227b7b7ee6df7d82bae99c6ef5291
SHA256c99f2632bd1e5b5ea6038b204cdd9f793ae7d58ba9ac3839204c78c74647cafe
SHA51231fdf8adaec30ebaeecf0e799af6c48582996c793249453bf27b3ebfcaf7aaa795d47d9086c05fadf3f6dd061d2a765272424e9403b5fd149760f24e083b1763