Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
teclamagica-main/instalar.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
teclamagica-main/instalar.bat
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
teclamagica-main/offsets.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
teclamagica-main/offsets.py
Resource
win11-20240802-en
General
-
Target
teclamagica-main/offsets.py
-
Size
776B
-
MD5
b453d3e1e617e032e5926bbebe460d11
-
SHA1
472197cd30a92f64387f6dc681fb08b52fd67c64
-
SHA256
b0b9c5ef44f9e60cfd8a0182aac035e88576d1f6a8b5f556ecaca819b2e3ec68
-
SHA512
cbeb378684021cacab15c0c28a6078a206d9c1410fe0290009d4b2052e27b50b876cb77c60b559c36037469faf3d3c9951c7d1b2f92b6fc878964fcddef6bfce
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5072 OpenWith.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe 5072 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\teclamagica-main\offsets.py1⤵
- Modifies registry class
PID:1916
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:81⤵PID:544