Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
11.08.exe
windows7-x64
81.08.exe
windows10-2004-x64
8SmartHideIPSetup.exe
windows7-x64
7SmartHideIPSetup.exe
windows10-2004-x64
7上門小姐網.url
windows7-x64
1上門小姐網.url
windows10-2004-x64
1博天堂�...��.url
windows7-x64
1博天堂�...��.url
windows10-2004-x64
1参考.bat
windows7-x64
1参考.bat
windows10-2004-x64
1國產AV�...��.url
windows7-x64
1國產AV�...��.url
windows10-2004-x64
1搞處女.url
windows7-x64
1搞處女.url
windows10-2004-x64
1深夜操逼逼.url
windows7-x64
1深夜操逼逼.url
windows10-2004-x64
1自动安�...29.exe
windows7-x64
自动安�...29.exe
windows10-2004-x64
1Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
1.08.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1.08.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SmartHideIPSetup.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
SmartHideIPSetup.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
上門小姐網.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
上門小姐網.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
博天堂娱乐城-提供真人百家乐-足球投注-电子老虎机-21点的大型博彩网站.url
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
博天堂娱乐城-提供真人百家乐-足球投注-电子老虎机-21点的大型博彩网站.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
参考.bat
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
参考.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
國產AV愛愛偷拍.url
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
國產AV愛愛偷拍.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
搞處女.url
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
搞處女.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
深夜操逼逼.url
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
深夜操逼逼.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
自动安装%28Ctrl%2BAlt%2BEnd%29.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
自动安装%28Ctrl%2BAlt%2BEnd%29.exe
Resource
win10v2004-20221111-en
General
-
Target
1.08.exe
-
Size
2.9MB
-
MD5
3984dd1bbadf1e28e79018aa86f63a4d
-
SHA1
68ecec1582a509d74c5157148b2940a20a6eb725
-
SHA256
611a8d361d04a71e5d5fa72cc8b24665fd8f09c39c3d4902f69e3c8c8e3e37a7
-
SHA512
af3ed54732d1b0f9a96926d9fc3c793b128c9f895e7117ffbe322403ea844b924b885cc2b066024fb1df510e80d946dc618ce3a08abd6a68a036681e7dad7aa6
-
SSDEEP
49152:0ypa4po00ODZCPLFDoOIV38iFUYgc+qY/NBqRp1vbp6jHlVgkc1jYCASMO70mbdl:0d4ykFCBU7tmncmsp5kHlEnP0mbdE3qz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1896 1.08.tmp -
Loads dropped DLL 3 IoCs
pid Process 2028 1.08.exe 1896 1.08.tmp 1896 1.08.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1896 2028 1.08.exe 26 PID 2028 wrote to memory of 1896 2028 1.08.exe 26 PID 2028 wrote to memory of 1896 2028 1.08.exe 26 PID 2028 wrote to memory of 1896 2028 1.08.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.08.exe"C:\Users\Admin\AppData\Local\Temp\1.08.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\is-VAJ24.tmp\1.08.tmp"C:\Users\Admin\AppData\Local\Temp\is-VAJ24.tmp\1.08.tmp" /SL5="$D0152,2830081,72704,C:\Users\Admin\AppData\Local\Temp\1.08.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD5ce9f5fb67f79ac919a7029331728aed0
SHA19f4c20cabc6f4b920362b9ec5d939237f332c3d2
SHA2560e379fac5f64bb9b7788478f40df4f0f7d20db46abf010276825d0115f65a856
SHA5128d828bded5e9cf3a5eb4a9d292dca6249f9be6c08142f2ad6243ae2a751b84e329c4529f2de247e87d9a40ac87f750aede368c79f3bbce74c5f917362378bdb9
-
Filesize
694KB
MD5ce9f5fb67f79ac919a7029331728aed0
SHA19f4c20cabc6f4b920362b9ec5d939237f332c3d2
SHA2560e379fac5f64bb9b7788478f40df4f0f7d20db46abf010276825d0115f65a856
SHA5128d828bded5e9cf3a5eb4a9d292dca6249f9be6c08142f2ad6243ae2a751b84e329c4529f2de247e87d9a40ac87f750aede368c79f3bbce74c5f917362378bdb9
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
694KB
MD5ce9f5fb67f79ac919a7029331728aed0
SHA19f4c20cabc6f4b920362b9ec5d939237f332c3d2
SHA2560e379fac5f64bb9b7788478f40df4f0f7d20db46abf010276825d0115f65a856
SHA5128d828bded5e9cf3a5eb4a9d292dca6249f9be6c08142f2ad6243ae2a751b84e329c4529f2de247e87d9a40ac87f750aede368c79f3bbce74c5f917362378bdb9