Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3Duck+Beta.rar
windows7-x64
3Duck+Beta.rar
windows10-2004-x64
3Duck Beta/...In.dll
windows7-x64
1Duck Beta/...In.dll
windows10-2004-x64
1Duck Beta/...ck.exe
windows7-x64
3Duck Beta/...ck.exe
windows10-2004-x64
3Duck Beta/...PI.dll
windows7-x64
1Duck Beta/...PI.dll
windows10-2004-x64
1Duck Beta/...os.txt
windows7-x64
1Duck Beta/...os.txt
windows10-2004-x64
1Duck Beta/...or.exe
windows7-x64
1Duck Beta/...or.exe
windows10-2004-x64
9Analysis
-
max time kernel
593s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
Duck+Beta.rar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Duck+Beta.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Duck Beta/Beta/Main/CeleryIn.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Duck Beta/Beta/Main/CeleryIn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Duck Beta/Beta/Main/Duck.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Duck Beta/Beta/Main/Duck.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Duck Beta/Beta/Main/DuckAPI.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Duck Beta/Beta/Main/DuckAPI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Duck Beta/Beta/Main/Executor's Infos.txt
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Duck Beta/Beta/Main/Executor's Infos.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Duck Beta/Beta/Main/Injector.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Duck Beta/Beta/Main/Injector.exe
Resource
win10v2004-20240802-en
General
-
Target
Duck+Beta.rar
-
Size
27.0MB
-
MD5
31c649b674e7bb4a82b0557f46a95522
-
SHA1
94d7f4d4b7b41519ef03b0b99fb850a53aff1620
-
SHA256
8d6227e9a84351e5b913914d1b153b0f6db20b474edf866d31c222fc5b97701e
-
SHA512
575cd12e2e0e5b6623c1cc14fe651de5a7ff7e3360c62b04f1e4cbb4fee5542b34afc02fd28650adc3e6320fc4bbd578cdde824776a2e3455e22593eb52450dd
-
SSDEEP
786432:6ZwTM4UWZEa01v2jWFXlazCd2TK8OHiSHd9oT:68UWZETnYzW2bI9k
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2624 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2108 2436 cmd.exe 32 PID 2436 wrote to memory of 2108 2436 cmd.exe 32 PID 2436 wrote to memory of 2108 2436 cmd.exe 32 PID 2108 wrote to memory of 2628 2108 rundll32.exe 33 PID 2108 wrote to memory of 2628 2108 rundll32.exe 33 PID 2108 wrote to memory of 2628 2108 rundll32.exe 33 PID 2628 wrote to memory of 2624 2628 rundll32.exe 35 PID 2628 wrote to memory of 2624 2628 rundll32.exe 35 PID 2628 wrote to memory of 2624 2628 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Duck+Beta.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Duck+Beta.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Duck+Beta.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Duck+Beta.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
-