Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
4#Pa$$w0rD_...#$.zip
windows7-x64
1#Pa$$w0rD_...#$.zip
windows10-2004-x64
1#Pa$$w0rD_...p#$.7z
windows7-x64
1#Pa$$w0rD_...p#$.7z
windows10-2004-x64
1Resources/...w.phpt
windows7-x64
3Resources/...w.phpt
windows10-2004-x64
3Resources/...1.phpt
windows7-x64
3Resources/...1.phpt
windows10-2004-x64
3Resources/...8.phpt
windows7-x64
3Resources/...8.phpt
windows10-2004-x64
5Resources/...g.phpt
windows7-x64
3Resources/...g.phpt
windows10-2004-x64
3Resources/...007.js
windows7-x64
3Resources/...007.js
windows10-2004-x64
3Resources/...3.phpt
windows7-x64
3Resources/...3.phpt
windows10-2004-x64
3Resources/...007.js
windows7-x64
3Resources/...007.js
windows10-2004-x64
3Resources/...4.phpt
windows7-x64
3Resources/...4.phpt
windows10-2004-x64
3Resources/...01.ps1
windows7-x64
3Resources/...01.ps1
windows10-2004-x64
3Resources/...oard.h
windows7-x64
3Resources/...oard.h
windows10-2004-x64
3Resources/...6.phpt
windows7-x64
3Resources/...6.phpt
windows10-2004-x64
3Resources/...8.phpt
windows7-x64
3Resources/...8.phpt
windows10-2004-x64
3Resources/...1.phpt
windows7-x64
3Resources/...1.phpt
windows10-2004-x64
3Resources/...6/htwj
windows7-x64
1Resources/...6/htwj
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 08:53
Behavioral task
behavioral1
Sample
#Pa$$w0rD__6654--0peɴ_Set-Up#$.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
#Pa$$w0rD__6654--0peɴ_Set-Up#$.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#Pa$$w0rD__6654--0peɴ_Set-Up#$.7z
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
#Pa$$w0rD__6654--0peɴ_Set-Up#$.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Resources/Data/x64/r4_groupH_simple_rpcenc_017w.phpt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Resources/Data/x64/r4_groupH_simple_rpcenc_017w.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Resources/Data/x64/schema041.phpt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Resources/Data/x64/schema041.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Resources/Data/x64/ssa_bug_008.phpt
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Resources/Data/x64/ssa_bug_008.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Resources/Data/x64/template_cloning.phpt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Resources/Data/x64/template_cloning.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Resources/Data/x64/try_multicatch_007.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Resources/Data/x64/try_multicatch_007.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Resources/Data/x64/x86/T33.phpt
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
Resources/Data/x64/x86/T33.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Resources/Data/x64/x86/bug64007.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Resources/Data/x64/x86/bug64007.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Resources/Data/x64/x86/bug72094.phpt
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Resources/Data/x64/x86/bug72094.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Resources/Data/x64/x86/foreachLoop.001.ps1
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Resources/Data/x64/x86/foreachLoop.001.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Resources/Data/x64/x86/fpm_scoreboard.h
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Resources/Data/x64/x86/fpm_scoreboard.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Resources/Data/x64/x86/frontcontroller16.phpt
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
Resources/Data/x64/x86/frontcontroller16.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Resources/Data/x64/x86/gh12908.phpt
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Resources/Data/x64/x86/gh12908.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Resources/Data/x64/x86/gh13991.phpt
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Resources/Data/x64/x86/gh13991.phpt
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Resources/Data/x64/x86/htwj
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Resources/Data/x64/x86/htwj
Resource
win10v2004-20241007-en
General
-
Target
Resources/Data/x64/x86/T33.phpt
-
Size
670B
-
MD5
ec3a7b53d44a86fbb688725cc780f046
-
SHA1
20a1d35ad33198238606ecd259e1de4d9eeb8bc8
-
SHA256
999f4fd02fbbef0f37d09884542a67e518bc73c0fa7248ffb374e01c4a630dae
-
SHA512
125274408ff309c03c89e84c8dbcf14ff55beb23550c3ea1754d976ed286e1b874c7453cd3dcfe186e8b1a7e6e867c68c010b7f551bf2cb03ea90a1a9c6a45a7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 AcroRd32.exe 2548 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2528 2712 cmd.exe 29 PID 2712 wrote to memory of 2528 2712 cmd.exe 29 PID 2712 wrote to memory of 2528 2712 cmd.exe 29 PID 2528 wrote to memory of 2548 2528 rundll32.exe 30 PID 2528 wrote to memory of 2548 2528 rundll32.exe 30 PID 2528 wrote to memory of 2548 2528 rundll32.exe 30 PID 2528 wrote to memory of 2548 2528 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Resources\Data\x64\x86\T33.phpt1⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Resources\Data\x64\x86\T33.phpt2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Resources\Data\x64\x86\T33.phpt"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dafa66f61ae96fe339483f64a8039c33
SHA12331c397a360ad678e5f761bf1a4fbb5a603bf6b
SHA256ba9176b03c5be81dec4ad4d95f04a5de042b418fa96044f094aa1d3b7d88975b
SHA512be4d97648ffd1fb4ae32edb56a73fcb0857c1a89ed3411757ebca1587b4be20cd7ffa499613267917ebbc4b7279c6377353849d3f463371099c63d0ca9da8791