Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1SkyNet-Dis...nes.py
windows7-x64
SkyNet-Dis...nes.py
windows10-2004-x64
3SkyNet-Dis...nds.py
windows7-x64
3SkyNet-Dis...nds.py
windows10-2004-x64
3SkyNet-Dis...der.py
windows7-x64
3SkyNet-Dis...der.py
windows10-2004-x64
3SkyNet-Dis...nts.py
windows7-x64
3SkyNet-Dis...nts.py
windows10-2004-x64
3SkyNet-Dis...nds.py
windows7-x64
3SkyNet-Dis...nds.py
windows10-2004-x64
3SkyNet-Dis...ler.py
windows7-x64
3SkyNet-Dis...ler.py
windows10-2004-x64
3SkyNet-Dis...ite.py
windows7-x64
3SkyNet-Dis...ite.py
windows10-2004-x64
3SkyNet-Dis...nds.py
windows7-x64
3SkyNet-Dis...nds.py
windows10-2004-x64
3SkyNet-Dis...nds.py
windows7-x64
3SkyNet-Dis...nds.py
windows10-2004-x64
3SkyNet-Dis...nts.py
windows7-x64
3SkyNet-Dis...nts.py
windows10-2004-x64
3SkyNet-Dis...nds.py
windows7-x64
3SkyNet-Dis...nds.py
windows10-2004-x64
3SkyNet-Dis...nds.py
windows7-x64
3SkyNet-Dis...nds.py
windows10-2004-x64
3SkyNet-Dis...ion.py
windows7-x64
3SkyNet-Dis...ion.py
windows10-2004-x64
3SkyNet-Dis...ase.py
windows7-x64
3SkyNet-Dis...ase.py
windows10-2004-x64
3SkyNet-Dis...ted.py
windows7-x64
3SkyNet-Dis...ted.py
windows10-2004-x64
3SkyNet-Dis...ics.py
windows7-x64
3SkyNet-Dis...ics.py
windows10-2004-x64
3Analysis
-
max time kernel
28s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
SkyNet-Discord-Bot-master/src/check_routines.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SkyNet-Discord-Bot-master/src/check_routines.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SkyNet-Discord-Bot-master/src/cogs/admin_commands.py
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SkyNet-Discord-Bot-master/src/cogs/admin_commands.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SkyNet-Discord-Bot-master/src/cogs/cog_loader.py
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SkyNet-Discord-Bot-master/src/cogs/cog_loader.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SkyNet-Discord-Bot-master/src/cogs/command_events.py
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SkyNet-Discord-Bot-master/src/cogs/command_events.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SkyNet-Discord-Bot-master/src/cogs/global_commands.py
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
SkyNet-Discord-Bot-master/src/cogs/global_commands.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SkyNet-Discord-Bot-master/src/cogs/guild_setup_handler.py
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SkyNet-Discord-Bot-master/src/cogs/guild_setup_handler.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
SkyNet-Discord-Bot-master/src/cogs/invite.py
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
SkyNet-Discord-Bot-master/src/cogs/invite.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
SkyNet-Discord-Bot-master/src/cogs/lab_commands.py
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
SkyNet-Discord-Bot-master/src/cogs/lab_commands.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
SkyNet-Discord-Bot-master/src/cogs/manager_commands.py
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
SkyNet-Discord-Bot-master/src/cogs/manager_commands.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
SkyNet-Discord-Bot-master/src/cogs/message_events.py
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
SkyNet-Discord-Bot-master/src/cogs/message_events.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
SkyNet-Discord-Bot-master/src/cogs/owner_commands.py
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
SkyNet-Discord-Bot-master/src/cogs/owner_commands.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
SkyNet-Discord-Bot-master/src/cogs/watchtower_commands.py
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
SkyNet-Discord-Bot-master/src/cogs/watchtower_commands.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
SkyNet-Discord-Bot-master/src/configuration.py
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
SkyNet-Discord-Bot-master/src/configuration.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
SkyNet-Discord-Bot-master/src/database.py
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
SkyNet-Discord-Bot-master/src/database.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
SkyNet-Discord-Bot-master/src/database_related.py
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
SkyNet-Discord-Bot-master/src/database_related.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
SkyNet-Discord-Bot-master/src/diagnostics.py
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
SkyNet-Discord-Bot-master/src/diagnostics.py
Resource
win10v2004-20240802-en
Errors
General
-
Target
SkyNet-Discord-Bot-master/src/check_routines.py
-
Size
726B
-
MD5
27a3b7899def647f981e4937068cc245
-
SHA1
9622d6a9d1dad2e91a61c2d0979281c15075203b
-
SHA256
194b51b40ee1f00277c8c7d4bcf208ba4ffd97b7fdf39eb73f3812672a37327f
-
SHA512
0bfb721434d25b1d1681de38b582227c567edd846315fb086751175b4d5c85ddcba5cd29cb4fdfe936944dd19449b9888a2c639d4dfe4044ff37fa04d525754a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.py rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2148 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2148 AUDIODG.EXE Token: 33 2148 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2148 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2872 AcroRd32.exe 2872 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 884 wrote to memory of 2884 884 cmd.exe 31 PID 884 wrote to memory of 2884 884 cmd.exe 31 PID 884 wrote to memory of 2884 884 cmd.exe 31 PID 2884 wrote to memory of 2872 2884 rundll32.exe 32 PID 2884 wrote to memory of 2872 2884 rundll32.exe 32 PID 2884 wrote to memory of 2872 2884 rundll32.exe 32 PID 2884 wrote to memory of 2872 2884 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SkyNet-Discord-Bot-master\src\check_routines.py1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SkyNet-Discord-Bot-master\src\check_routines.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SkyNet-Discord-Bot-master\src\check_routines.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2168
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ace62515cfc6938c8510d193db10f2fc
SHA1cb36eb863aac6a5b6aa9cf139bd7dd0354ba0d18
SHA256f19582fbef9f82ff08d79db7822784c6e9f32cad386fe17f7b602b71a124ed13
SHA512423da520753ac9f6ceb3230311c6d74aa86dc6d4adcd197ab070794026c94f596857911733756cebe31265922f30d5fa55a41a4bb331c136e3d2e3ac6aa8e1b3