Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 08:45
Behavioral task
behavioral1
Sample
Aurafn.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Aurafn.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
dc142ea2dc066cbfab1bb9cecb9bdcc5
-
SHA1
f02ba8634b3e9de4fd369fbf7bf5d145f3a03eab
-
SHA256
0063cc3fa6d5dc7e28104b7bdf381f0863c1bba905360abbaf94aefe0b567900
-
SHA512
3fe24370b6f52b746bfd7e4016adc668064bd311423da9cec3589942c3589f8a498fe5c896a84040d26f117fd2c25378f53180e0588b7264ae0b5fdaad9a055e
-
SSDEEP
192:wG9KWLD8qXgWdXwRAIKUJhwPyapMdwA4Qnw:T9K4wWuRTp2Py4P0w
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2664 AcroRd32.exe 2664 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2932 1280 cmd.exe 32 PID 1280 wrote to memory of 2932 1280 cmd.exe 32 PID 1280 wrote to memory of 2932 1280 cmd.exe 32 PID 2932 wrote to memory of 2664 2932 rundll32.exe 33 PID 2932 wrote to memory of 2664 2932 rundll32.exe 33 PID 2932 wrote to memory of 2664 2932 rundll32.exe 33 PID 2932 wrote to memory of 2664 2932 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5657a16f57b8408720ce0a6f6e76e631d
SHA1b2b804e7ecdf1efdd17c3cafbb68406bcd3c52d4
SHA256cb793744da663e93cdd29735663b658facf35bf135a58bd529d15b34821a1e70
SHA512b001f58450e1a73b4aaaa748a9e2c376df88431dddb76506ae38696c964f068b0145f7b232ffd8f45851f43fad99e9b10318c0bfee242d3dd596d4ab63ef4fa9