Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 05:03
Behavioral task
behavioral1
Sample
auxia_loader.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
auxia_loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
874KB
-
MD5
8fc5a06161d47317f5a97f2c76cbba6e
-
SHA1
6438cc8edc9bd08ddfba78079b352c6aea92e945
-
SHA256
5676900dbe7afa5c9d70354a7c553db29bdd3acca73449e6ae6f276c2fec6b56
-
SHA512
fb1c7d2aa90a585184a269b2c1d014e3bdc7a97e4dc014a6915b28582817181907c07b0d628cd1e90b736ccdab4a0880f74b72aa2698aafb230bd112e1e5e0f5
-
SSDEEP
24576:7Q7kerdwCF6o753sWIqDDOKB/hCcYr0o3eEu:Pkss1YrVO9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 600 wrote to memory of 1508 600 cmd.exe 31 PID 600 wrote to memory of 1508 600 cmd.exe 31 PID 600 wrote to memory of 1508 600 cmd.exe 31 PID 1508 wrote to memory of 2828 1508 rundll32.exe 32 PID 1508 wrote to memory of 2828 1508 rundll32.exe 32 PID 1508 wrote to memory of 2828 1508 rundll32.exe 32 PID 1508 wrote to memory of 2828 1508 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54d9850dbfae1098b13459acb4ab2abdd
SHA12044737412007e84b46d1e2fb03f36550a7f0efa
SHA256ff82e3306e6acfea6cdbad678c6bb1e85199b6a679e9a919b8c9f4d5356cdc7a
SHA512d073b6dc7c0b649864d6c2a3a45e6cf409f8880ab5fb3f8162b6c6297657b85454f8a6431b18d6a85d206a6866b03b0133b50b80e94ee9f17006c974570c02b5