Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/09/2024, 08:04
240928-jyaqdsvfkr 328/09/2024, 08:03
240928-jxy2laxepe 328/09/2024, 08:01
240928-jwypfaxekc 3Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 08:04
Behavioral task
behavioral1
Sample
Matcha.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Matcha.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Matcha.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Matcha.pyc
Resource
win10v2004-20240802-en
General
-
Target
Matcha.pyc
-
Size
40KB
-
MD5
4511661d473e8ec3065d86bde7dfa316
-
SHA1
cbe5a619dbfed3590decad64226509ae94fde68c
-
SHA256
4c390748b52804ec151a8de36a426f268c913181dcac46edcb568d89fc0f68ca
-
SHA512
6e92b0cde36c29ae39bc4597b38c4b231c18071d3b5613f026a8037fcd61212c7b584d4adce89f29e3d3f44df5996bd64f95af61af176af8816995d2bbbaeca9
-
SSDEEP
384:ZvIpuELciDgxwAAMGRe4ULBd84prQv+iZSgvDwIFkjj+LYjyV9DtC68a:ZvIp/LfAQetbkv+iZxDvLeyV9Dtx8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2820 2368 cmd.exe 30 PID 2368 wrote to memory of 2820 2368 cmd.exe 30 PID 2368 wrote to memory of 2820 2368 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Matcha.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Matcha.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2820
-