Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3Rebel.zip
windows7-x64
1Rebel.zip
windows10-2004-x64
1Bin/Injector.exe
windows7-x64
5Bin/Injector.exe
windows10-2004-x64
5Bin/Rebel.dll
windows7-x64
1Bin/Rebel.dll
windows10-2004-x64
1FastColore...ox.dll
windows7-x64
1FastColore...ox.dll
windows10-2004-x64
1FastColore...ox.xml
windows7-x64
3FastColore...ox.xml
windows10-2004-x64
1ReadMe.txt
windows7-x64
1ReadMe.txt
windows10-2004-x64
1RebelCracked.exe
windows7-x64
8RebelCracked.exe
windows10-2004-x64
8System.CodeDom.dll
windows7-x64
1System.CodeDom.dll
windows10-2004-x64
1System.CodeDom.xml
windows7-x64
3System.CodeDom.xml
windows10-2004-x64
1Analysis
-
max time kernel
1559s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
Rebel.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Rebel.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Bin/Injector.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Bin/Injector.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Bin/Rebel.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Bin/Rebel.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
FastColoredTextBox.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
FastColoredTextBox.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
FastColoredTextBox.xml
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
FastColoredTextBox.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ReadMe.txt
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
ReadMe.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
RebelCracked.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
RebelCracked.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
System.CodeDom.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
System.CodeDom.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
System.CodeDom.xml
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
System.CodeDom.xml
Resource
win10v2004-20240802-en
General
-
Target
RebelCracked.exe
-
Size
57.8MB
-
MD5
106354515fc5eb24ea541daa429590d6
-
SHA1
d022cbb1182fc17a38a0c4219ac79bf59d18a3f5
-
SHA256
bb60a9d9e8754a155b17a47791384acc43977b734b2eeb02e0e8cab61c52d01a
-
SHA512
d4fbc160b55cf3ba5b7ce5d7da5315fb13308af2a6c081ff0fd23b83bdfe71aedb18b04925fed878dca67f02fa8860be21614d964571cc9eb3a19d8d2781c59c
-
SSDEEP
1572864:OGwtPq5tswXXt+cydb3w8p5KpwsH9KN5gjHoC7or1Xt0:bwF0BtMz5swsHI78ICAXt0
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2756 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 2884 RuntimeBroker.exe 2920 RuntimeBroker.exe 1180 Process not Found -
Loads dropped DLL 9 IoCs
pid Process 2372 RebelCracked.exe 2920 RuntimeBroker.exe 2920 RuntimeBroker.exe 2920 RuntimeBroker.exe 2920 RuntimeBroker.exe 2920 RuntimeBroker.exe 2920 RuntimeBroker.exe 2920 RuntimeBroker.exe 1180 Process not Found -
resource yara_rule behavioral13/files/0x00030000000208c4-804.dat upx behavioral13/memory/2920-806-0x000007FEF1CC0000-0x000007FEF22A9000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\RuntimeBroker.exe RebelCracked.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2756 2372 RebelCracked.exe 31 PID 2372 wrote to memory of 2756 2372 RebelCracked.exe 31 PID 2372 wrote to memory of 2756 2372 RebelCracked.exe 31 PID 2372 wrote to memory of 2884 2372 RebelCracked.exe 33 PID 2372 wrote to memory of 2884 2372 RebelCracked.exe 33 PID 2372 wrote to memory of 2884 2372 RebelCracked.exe 33 PID 2372 wrote to memory of 3064 2372 RebelCracked.exe 34 PID 2372 wrote to memory of 3064 2372 RebelCracked.exe 34 PID 2372 wrote to memory of 3064 2372 RebelCracked.exe 34 PID 2884 wrote to memory of 2920 2884 RuntimeBroker.exe 35 PID 2884 wrote to memory of 2920 2884 RuntimeBroker.exe 35 PID 2884 wrote to memory of 2920 2884 RuntimeBroker.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\System32\RuntimeBroker.exe"C:\Windows\System32\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\RuntimeBroker.exe"C:\Windows\System32\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"2⤵PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5bcb8b9f6606d4094270b6d9b2ed92139
SHA1bd55e985db649eadcb444857beed397362a2ba7b
SHA256fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118
SHA512869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
21KB
MD520ddf543a1abe7aee845de1ec1d3aa8e
SHA10eaf5de57369e1db7f275a2fffd2d2c9e5af65bf
SHA256d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8
SHA51296dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd
-
Filesize
21KB
MD54380d56a3b83ca19ea269747c9b8302b
SHA10c4427f6f0f367d180d37fc10ecbe6534ef6469c
SHA256a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a
SHA5121c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4
-
Filesize
21KB
MD52554060f26e548a089cab427990aacdf
SHA18cc7a44a16d6b0a6b7ed444e68990ff296d712fe
SHA2565ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044
SHA512fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506
-
Filesize
1.6MB
MD5ac6cc302aa9e58ec53b56b9f2786de40
SHA11375c081b7c920ee267002bc153ff3b80c07187e
SHA2562f48c4d1ad846f7617e886cbdc88154d17464be0eabc5fa9db81cead0d157056
SHA5129bdfe7ebca2d01fdba940e646418579abc8fdccea7e772f3e98eef5f6d4743ebda0796ad7356a29f3472149b5468758600e5d2e3eaaa53a737771effc3d6fcb2
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd