Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
6CyberDEV C...nd.pyc
windows7-x64
3CyberDEV C...nd.pyc
windows10-2004-x64
3CyberDEV C...er.pyc
windows7-x64
3CyberDEV C...er.pyc
windows10-2004-x64
3CyberDEV C...or.pyc
windows7-x64
3CyberDEV C...or.pyc
windows10-2004-x64
3CyberDEV C...nts.js
windows7-x64
3CyberDEV C...nts.js
windows10-2004-x64
3CyberDEV C...ute.js
windows7-x64
3CyberDEV C...ute.js
windows10-2004-x64
3CyberDEV C...yed.js
windows7-x64
3CyberDEV C...yed.js
windows10-2004-x64
10CyberDEV C...le.pyc
windows7-x64
3CyberDEV C...le.pyc
windows10-2004-x64
3CyberDEV C...on.pyc
windows7-x64
3CyberDEV C...on.pyc
windows10-2004-x64
3CyberDEV C...ey.pyc
windows7-x64
3CyberDEV C...ey.pyc
windows10-2004-x64
3CyberDEV C...ot.pyc
windows7-x64
3CyberDEV C...ot.pyc
windows10-2004-x64
3CyberDEV C...to.pyc
windows7-x64
3CyberDEV C...to.pyc
windows10-2004-x64
3CyberDEV C...ls.pyc
windows7-x64
3CyberDEV C...ls.pyc
windows10-2004-x64
3CyberDEV C...ver.js
windows7-x64
3CyberDEV C...ver.js
windows10-2004-x64
3CyberDEV C...nt.pyc
windows7-x64
3CyberDEV C...nt.pyc
windows10-2004-x64
3CyberDEV C...on.pyc
windows7-x64
3CyberDEV C...on.pyc
windows10-2004-x64
3CyberDEV C...__.pyc
windows7-x64
3CyberDEV C...__.pyc
windows10-2004-x64
3Analysis
-
max time kernel
1553s -
max time network
1558s -
platform
windows7_x64 -
resource
win7-20240708-ja -
resource tags
arch:x64arch:x86image:win7-20240708-jalocale:ja-jpos:windows7-x64systemwindows -
submitted
14/08/2024, 05:47
Behavioral task
behavioral1
Sample
CyberDEV Client/lib/selenium/webdriver/remote/command.pyc
Resource
win7-20240704-ja
Behavioral task
behavioral2
Sample
CyberDEV Client/lib/selenium/webdriver/remote/command.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral3
Sample
CyberDEV Client/lib/selenium/webdriver/remote/errorhandler.pyc
Resource
win7-20240729-ja
Behavioral task
behavioral4
Sample
CyberDEV Client/lib/selenium/webdriver/remote/errorhandler.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral5
Sample
CyberDEV Client/lib/selenium/webdriver/remote/file_detector.pyc
Resource
win7-20240729-ja
Behavioral task
behavioral6
Sample
CyberDEV Client/lib/selenium/webdriver/remote/file_detector.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral7
Sample
CyberDEV Client/lib/selenium/webdriver/remote/findElements.js
Resource
win7-20240708-ja
Behavioral task
behavioral8
Sample
CyberDEV Client/lib/selenium/webdriver/remote/findElements.js
Resource
win10v2004-20240802-ja
Behavioral task
behavioral9
Sample
CyberDEV Client/lib/selenium/webdriver/remote/getAttribute.js
Resource
win7-20240708-ja
Behavioral task
behavioral10
Sample
CyberDEV Client/lib/selenium/webdriver/remote/getAttribute.js
Resource
win10v2004-20240802-ja
Behavioral task
behavioral11
Sample
CyberDEV Client/lib/selenium/webdriver/remote/isDisplayed.js
Resource
win7-20240704-ja
Behavioral task
behavioral12
Sample
CyberDEV Client/lib/selenium/webdriver/remote/isDisplayed.js
Resource
win10v2004-20240802-ja
Behavioral task
behavioral13
Sample
CyberDEV Client/lib/selenium/webdriver/remote/mobile.pyc
Resource
win7-20240708-ja
Behavioral task
behavioral14
Sample
CyberDEV Client/lib/selenium/webdriver/remote/mobile.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral15
Sample
CyberDEV Client/lib/selenium/webdriver/remote/remote_connection.pyc
Resource
win7-20240729-ja
Behavioral task
behavioral16
Sample
CyberDEV Client/lib/selenium/webdriver/remote/remote_connection.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral17
Sample
CyberDEV Client/lib/selenium/webdriver/remote/script_key.pyc
Resource
win7-20240708-ja
Behavioral task
behavioral18
Sample
CyberDEV Client/lib/selenium/webdriver/remote/script_key.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral19
Sample
CyberDEV Client/lib/selenium/webdriver/remote/shadowroot.pyc
Resource
win7-20240708-ja
Behavioral task
behavioral20
Sample
CyberDEV Client/lib/selenium/webdriver/remote/shadowroot.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral21
Sample
CyberDEV Client/lib/selenium/webdriver/remote/switch_to.pyc
Resource
win7-20240704-ja
Behavioral task
behavioral22
Sample
CyberDEV Client/lib/selenium/webdriver/remote/switch_to.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral23
Sample
CyberDEV Client/lib/selenium/webdriver/remote/utils.pyc
Resource
win7-20240704-ja
Behavioral task
behavioral24
Sample
CyberDEV Client/lib/selenium/webdriver/remote/utils.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral25
Sample
CyberDEV Client/lib/selenium/webdriver/remote/webdriver.js
Resource
win7-20240704-ja
Behavioral task
behavioral26
Sample
CyberDEV Client/lib/selenium/webdriver/remote/webdriver.js
Resource
win10v2004-20240802-ja
Behavioral task
behavioral27
Sample
CyberDEV Client/lib/selenium/webdriver/remote/webelement.pyc
Resource
win7-20240729-ja
Behavioral task
behavioral28
Sample
CyberDEV Client/lib/selenium/webdriver/remote/webelement.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral29
Sample
CyberDEV Client/lib/selenium/webdriver/remote/websocket_connection.pyc
Resource
win7-20240729-ja
Behavioral task
behavioral30
Sample
CyberDEV Client/lib/selenium/webdriver/remote/websocket_connection.pyc
Resource
win10v2004-20240802-ja
Behavioral task
behavioral31
Sample
CyberDEV Client/lib/selenium/webdriver/safari/__init__.pyc
Resource
win7-20240708-ja
Behavioral task
behavioral32
Sample
CyberDEV Client/lib/selenium/webdriver/safari/__init__.pyc
Resource
win10v2004-20240802-ja
General
-
Target
CyberDEV Client/lib/selenium/webdriver/remote/mobile.pyc
-
Size
3KB
-
MD5
910d8cba2873be53dc7b9be0794237ab
-
SHA1
9241a55557d36eaf2479a64d689ba0c8d1403357
-
SHA256
90d57e8cbe54c0e4ad3382ad8ebeb79e5c25b1aec7bdf385fcf11839eaf3e08b
-
SHA512
2423a26f24aa7d37aaba2e6cb6d8913161b6b130f9f67d19d740f98c248a5c08c45e13721fbafc289cb82dbb698b921fae8903db571694bc60094f219e15790d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.pyc rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 296 wrote to memory of 2456 296 cmd.exe 31 PID 296 wrote to memory of 2456 296 cmd.exe 31 PID 296 wrote to memory of 2456 296 cmd.exe 31 PID 2456 wrote to memory of 2644 2456 rundll32.exe 33 PID 2456 wrote to memory of 2644 2456 rundll32.exe 33 PID 2456 wrote to memory of 2644 2456 rundll32.exe 33 PID 2456 wrote to memory of 2644 2456 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\mobile.pyc"1⤵
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\mobile.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CyberDEV Client\lib\selenium\webdriver\remote\mobile.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e636d8d0a482094a9ecb3925d6cff0b3
SHA10b1bd13c85d0be8faf61f40aa7efabd13c84cedd
SHA256293d907b09fbe33c702af6bedcfed14d6631a5cdb81593a39dc04ff9a187e5de
SHA5120942615e861d3fee4a77c1be8bc1a56b386909e494853944d487bdc2b11d87c07e03f7a1a2b45cae6e3d11db020ec72fc30f85b200df7a10cc0b651e58db145d