Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/09/2024, 00:17
Behavioral task
behavioral1
Sample
SaintedV2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SaintedV2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
876KB
-
MD5
e3b59149a029557d774fc09874c366f3
-
SHA1
b9ae5008711b77f720685364879efb7b3e03f263
-
SHA256
f265a5dbdae6716add53c2e3b71033753c837fd676704ad030ff20a5ba6d975d
-
SHA512
f3e301660538552ca023a90494d900f62712d7f211fc529ab651af1204fd8c3174bbeeac5dc57b63e7705dff154d9d95ec4632f036a30a08eeb736f5e547eb48
-
SSDEEP
24576:8X7m2uZNPAUjuawX4FZiYsiTupR2DjTJx86:kdXMPqa86
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1536 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1536 AcroRd32.exe 1536 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2872 1056 cmd.exe 29 PID 1056 wrote to memory of 2872 1056 cmd.exe 29 PID 1056 wrote to memory of 2872 1056 cmd.exe 29 PID 2872 wrote to memory of 1536 2872 rundll32.exe 30 PID 2872 wrote to memory of 1536 2872 rundll32.exe 30 PID 2872 wrote to memory of 1536 2872 rundll32.exe 30 PID 2872 wrote to memory of 1536 2872 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5decc5fd0e82f37eb725aa8f7efb780ee
SHA1325e1c19c92836a10284ec56e1fe8dda86fe5a3f
SHA25648b260e4850319dfdb36768b1e5aa1449b0e0e12886b6b0bc04bd0568ed0e302
SHA5121a930f578af02990fa05fcfbda70db3cef95223d2c6612c1292b8083bfe595dbb3faabe8a4b262d6203cadd21b70d1f00800b39ddd425ba8a493200add3c309f