Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
710.exe
windows7-x64
310.exe
windows10-2004-x64
312DNF小马.exe
windows7-x64
712DNF小马.exe
windows10-2004-x64
7521DNF-HA(新).exe
windows7-x64
1521DNF-HA(新).exe
windows10-2004-x64
3DNF掉线�...��.bat
windows7-x64
1DNF掉线�...��.bat
windows10-2004-x64
7冒火.dll
windows7-x64
7冒火.dll
windows10-2004-x64
7查看最�...��.url
windows7-x64
1查看最�...��.url
windows10-2004-x64
1觉醒.dll
windows7-x64
7觉醒.dll
windows10-2004-x64
7风暴.dll
windows7-x64
7风暴.dll
windows10-2004-x64
7Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:17
Behavioral task
behavioral1
Sample
10.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
12DNF小马.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
12DNF小马.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
521DNF-HA(新).exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
521DNF-HA(新).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
DNF掉线数据清理1.3版.bat
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
DNF掉线数据清理1.3版.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
冒火.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
冒火.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
查看最新代码.url
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
查看最新代码.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
觉醒.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
觉醒.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
风暴.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
风暴.dll
Resource
win10v2004-20231215-en
General
-
Target
12DNF小马.exe
-
Size
18KB
-
MD5
e076485da1aef93f3621aa6b7c05ba73
-
SHA1
3653395ed051c2524a057ddd3803a673d4ba722e
-
SHA256
7af91034be743da9149c18584ffeb71cb0db100a15739f6169a5b29755a25092
-
SHA512
fdce6b959d1fd8a1e61379b25d57f0b09c67ba274c9634a301fddefe1cc45ec1eb1b6c158afb37ee8c4e5ecbae14c5c59518dad65210807397c2118c214acc86
-
SSDEEP
384:IkJcqs0mP5C3SyeTfyEdftyVVhxY+uuyhGy1KSYz:lLhopTfyEBaHxY+uuFVz
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral3/files/0x0009000000012252-1.dat acprotect -
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2152 12DNF小马.exe -
resource yara_rule behavioral3/files/0x0009000000012252-1.dat upx behavioral3/memory/2152-3-0x0000000010000000-0x0000000010013000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\jlfdnf.dll 12DNF小马.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2152 12DNF小马.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2660 2152 12DNF小马.exe 29 PID 2152 wrote to memory of 2660 2152 12DNF小马.exe 29 PID 2152 wrote to memory of 2660 2152 12DNF小马.exe 29 PID 2152 wrote to memory of 2660 2152 12DNF小马.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12DNF小马.exe"C:\Users\Admin\AppData\Local\Temp\12DNF小马.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\clear.bat" "2⤵
- Deletes itself
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115B
MD53822327d98aaaaa4d2c340d991362630
SHA10a52cf6d4604a4a0d55254caa206e0ff4f3b41c0
SHA2564219f489321d65eea3ccce9a2cf3fe6e9aff3ee20716ea93ac2f17bb0f05410e
SHA51265160cc603051bb451b8d3ac3f95678127c392ba72bf4fc814323c22ce547d7a91dd692787b9dfb1bd8e34c81555e3a7e63e605db789fe9f71bf64788be55d2d
-
Filesize
12KB
MD536c52feaff4dde88177946b05c3b3e48
SHA1344c89eef11c30f2f03b82c58eced636e8c9b586
SHA256f648e6e33aa80df03a0501f41486fbfe36c362e0a4caf728a87e7a54f4139077
SHA512a2ec60119922d7567a9707f43fb7c369ad90d38b01444b0d57a0099e2fa494a753278406954289fab8e01b620c3066fd7ef62c376ab7ce17cd9cfd4db12dabf0