Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ClientSetup.exe
windows7-x64
7ClientSetup.exe
windows10-2004-x64
7ServerSetup.exe
windows7-x64
7ServerSetup.exe
windows10-2004-x64
7Conn.asp
windows7-x64
3Conn.asp
windows10-2004-x64
3action.asp
windows7-x64
3action.asp
windows10-2004-x64
3bottom.asp
windows7-x64
3bottom.asp
windows10-2004-x64
3checkSys.asp
windows7-x64
3checkSys.asp
windows10-2004-x64
3chk.asp
windows7-x64
3chk.asp
windows10-2004-x64
3cxctl.asp
windows7-x64
3cxctl.asp
windows10-2004-x64
3default.asp
windows7-x64
3default.asp
windows10-2004-x64
3dt.asp
windows7-x64
3dt.asp
windows10-2004-x64
3getdata.asp
windows7-x64
3getdata.asp
windows10-2004-x64
3gfhcx.asp
windows7-x64
3gfhcx.asp
windows10-2004-x64
3groupset.asp
windows7-x64
3groupset.asp
windows10-2004-x64
3gscreencx.asp
windows7-x64
3gscreencx.asp
windows10-2004-x64
3gsysset.asp
windows7-x64
3gsysset.asp
windows10-2004-x64
3gurlset.asp
windows7-x64
3gurlset.asp
windows10-2004-x64
3Analysis
-
max time kernel
254s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
ClientSetup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ClientSetup.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ServerSetup.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ServerSetup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Conn.asp
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Conn.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
action.asp
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
action.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
bottom.asp
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
bottom.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
checkSys.asp
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
checkSys.asp
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
chk.asp
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
chk.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
cxctl.asp
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
cxctl.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
default.asp
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
default.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
dt.asp
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
dt.asp
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
getdata.asp
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
getdata.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
gfhcx.asp
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
gfhcx.asp
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
groupset.asp
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
groupset.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
gscreencx.asp
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
gscreencx.asp
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
gsysset.asp
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
gsysset.asp
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
gurlset.asp
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
gurlset.asp
Resource
win10v2004-20231222-en
General
-
Target
ClientSetup.exe
-
Size
3.6MB
-
MD5
3439fab56ae86d13e751a7df5715b339
-
SHA1
01c4d24db6fbb4a6fbe15f1f61e3fb95a519daad
-
SHA256
6b6fee52bd65eedfb3552f948e5aa360e0582707755537861e62ac01e31aac4f
-
SHA512
b9ec4c64edf406cabcd98540cecb4bc0efad4ddfd37ac193f33a50b66fd8985e7252571b6c9a1382b335240cfadf9cebb8f6ac72269ed979c1786fbcb5f3436c
-
SSDEEP
49152:hxBb3umRcMuNvYMyeTIzRG2Ucc4qwmepiAYVvCfZRXy/kPZk42Hzu8+aheU25Yo8:hz3WN/+VqwbpjcSisFGwnVy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 748 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2788 ClientSetup.exe 748 setup.exe 748 setup.exe 748 setup.exe -
resource yara_rule behavioral1/files/0x001000000000b1f5-9.dat upx behavioral1/memory/2788-11-0x0000000002E60000-0x0000000002ED1000-memory.dmp upx behavioral1/memory/748-18-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/748-24-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2788 wrote to memory of 748 2788 ClientSetup.exe 28 PID 2788 wrote to memory of 748 2788 ClientSetup.exe 28 PID 2788 wrote to memory of 748 2788 ClientSetup.exe 28 PID 2788 wrote to memory of 748 2788 ClientSetup.exe 28 PID 2788 wrote to memory of 748 2788 ClientSetup.exe 28 PID 2788 wrote to memory of 748 2788 ClientSetup.exe 28 PID 2788 wrote to memory of 748 2788 ClientSetup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ClientSetup.exe"C:\Users\Admin\AppData\Local\Temp\ClientSetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\ae12685\setup.exeC:\Users\Admin\AppData\Local\Temp\ae12685\setup.exe -d "C:\Users\Admin\AppData\Local\Temp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD527f3a31ac59d75dc1948eb8078ad8b12
SHA11192000d9facaf1acf4ed81495f830ff4daff6a2
SHA256eeb9c78faa5eb391aea33d2f155a689256b8b4162ca989375604b2ad5815a490
SHA512bc3d1984c7393e941f53e748e7683426ce2a158c3ab774b4fe667a7c7d4bd35ed18f77d5b082a874f0827e0b0ef177e8ed06ea86d9f3c0acddb3ddec44590b74
-
Filesize
88KB
MD5c668aaccad0683f829699ed82caded1a
SHA1502845d1da318e3f91e3f0589a5a05dfdf218d05
SHA256b74de4075e086f1a8ab95ed5561a1518c729e3035b86cddb182f21742afd7848
SHA51241168d812b82598d431adb5ba25b3362df4fc975c237a218cd1917fc95fcb81c1445de3062c79ece2c0078d7aa24e6854bfee43495086bb3b5ef0338953060eb
-
Filesize
4KB
MD5b02bab409baabb2f432a9deb588edc75
SHA1485b21647b8037864e35e4fa6fb268ba50883fd5
SHA256a00b95f9e9b0e3f7fb145eabd68be1688cab81adb399c23d8810ed0fc3e0293d
SHA512484c86c43a3a2e978e150b12cbf7948492a60aee49eff581574b5845d31c58998066dac8332ffd38ce1106778405e0cbd6622c8bf06b7877fa7c0ca777a9f17c
-
Filesize
149KB
MD5808e84852804a6a0a036edf798428f6c
SHA18b8923c86da2bd7fbe15bf8ec0178fa210b06e8e
SHA2562208362d112c755d569a03e28282b30dd53ddd79fe44dcde6ecad23ea82b37b2
SHA5129df79af8b7fd4945ffc58122063ba797b39a905f1665ce4c802a30bf8c721e1498296862fee0aa9291456aae0f6bc6634a5303ac22b336f927ba290c25b4ef6a