Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3V1.5.6.+.V1.5.8.zip
windows7-x64
1V1.5.6.+.V1.5.8.zip
windows10-2004-x64
1V1.5.6 + ...s.json
windows7-x64
3V1.5.6 + ...s.json
windows10-2004-x64
3V1.5.6 + ...UI.exe
windows7-x64
1V1.5.6 + ...UI.exe
windows10-2004-x64
1V1.5.6 + ...UI.exe
windows7-x64
3V1.5.6 + ...UI.exe
windows10-2004-x64
1V1.5.6 + ...UI.pdb
windows7-x64
3V1.5.6 + ...UI.pdb
windows10-2004-x64
3V1.5.6 + ...g.json
windows7-x64
3V1.5.6 + ...g.json
windows10-2004-x64
3V1.5.6 + ...s.json
windows7-x64
3V1.5.6 + ...s.json
windows10-2004-x64
3V1.5.6 + ...UI.exe
windows7-x64
1V1.5.6 + ...UI.exe
windows10-2004-x64
1V1.5.6 + ...UI.exe
windows7-x64
3V1.5.6 + ...UI.exe
windows10-2004-x64
7V1.5.6 + ...UI.pdb
windows7-x64
3V1.5.6 + ...UI.pdb
windows10-2004-x64
3V1.5.6 + ...g.json
windows7-x64
3V1.5.6 + ...g.json
windows10-2004-x64
3V1.5.6 + ...es.dll
windows7-x64
1V1.5.6 + ...es.dll
windows10-2004-x64
1V1.5.6 + ...og.dll
windows7-x64
1V1.5.6 + ...og.dll
windows10-2004-x64
1V1.5.6 + ...er.dll
windows7-x64
1V1.5.6 + ...er.dll
windows10-2004-x64
1V1.5.6 + ...ml.dll
windows7-x64
3V1.5.6 + ...ml.dll
windows10-2004-x64
3V1.5.6 + ...me.dll
windows7-x64
3V1.5.6 + ...me.dll
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
V1.5.6.+.V1.5.8.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
V1.5.6.+.V1.5.8.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.deps.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.pdb
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.runtimeconfig.json
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.6/SecHex-GUI.runtimeconfig.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.deps.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.pdb
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.runtimeconfig.json
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.runtimeconfig.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.Messages.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.Messages.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/net6.0/System.Diagnostics.EventLog.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/net6.0/System.ServiceProcess.ServiceController.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/net6.0/System.ServiceProcess.ServiceController.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/netcoreapp3.0/System.Runtime.WindowsRuntime.UI.Xaml.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/netcoreapp3.0/System.Runtime.WindowsRuntime.UI.Xaml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/netcoreapp3.0/System.Runtime.WindowsRuntime.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/runtimes/win/lib/netcoreapp3.0/System.Runtime.WindowsRuntime.dll
Resource
win10v2004-20241007-en
General
-
Target
V1.5.6 + V1.5.8/SecHex-Spoofy V1.5.8 (testing)/SecHex-GUI.pdb
-
Size
36KB
-
MD5
7d0e9a9ae399a11b9b6645cb1577c326
-
SHA1
dbd70768aa768b1570dfc0c14e0c3a25f809dd4f
-
SHA256
64d236de60ea2d3257dba85c5c1dfa3e8c2123821f8e4ade7c0cdd1c3a1d4a37
-
SHA512
45d74abd07f05b92cf9b85213db1cc6e2890c91346e156fce18347d32c2c873558cb679cd4307636256f3ca0ab2599498d060b9206c28064c479b70e12172606
-
SSDEEP
768:x2414TNpWNZH62L4eERtahv4QGy9VtrPdcBdl1lu:xzeTNpW37U0hFvxdUf1lu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2776 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2776 AcroRd32.exe 2776 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2960 2116 cmd.exe 30 PID 2116 wrote to memory of 2960 2116 cmd.exe 30 PID 2116 wrote to memory of 2960 2116 cmd.exe 30 PID 2960 wrote to memory of 2776 2960 rundll32.exe 31 PID 2960 wrote to memory of 2776 2960 rundll32.exe 31 PID 2960 wrote to memory of 2776 2960 rundll32.exe 31 PID 2960 wrote to memory of 2776 2960 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\V1.5.6 + V1.5.8\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.pdb"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\V1.5.6 + V1.5.8\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.pdb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\V1.5.6 + V1.5.8\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.pdb"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e56f6980ef0340461a615679cfe887ef
SHA1dbcf47b607d6439b2d3054730935a98a7f847bb4
SHA256657ca246500370082c4185dcb923aa4e485318ad97aef78f8e51c699bc4c898a
SHA51292a83b47ee92a53c70c882ba40bb1e25f3857293b97cace22538a2ddcefbfc6f76207e9b2ed3694b800ebed612c2a66a21a21b567f3b6d2935f22f3bf5996b4d