Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
77512779169...a3.exe
windows7-x64
77512779169...a3.exe
windows10-2004-x64
10$PLUGINSDI...st.dll
windows7-x64
1$PLUGINSDI...st.dll
windows10-2004-x64
10$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
10$PLUGINSDI...c3.dll
windows7-x64
3$PLUGINSDI...c3.dll
windows10-2004-x64
10$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
10$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
10$PLUGINSDI...it.dll
windows7-x64
7$PLUGINSDI...it.dll
windows10-2004-x64
10Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 17:18
Behavioral task
behavioral1
Sample
75127791692e1c0d611bce2d717d76a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75127791692e1c0d611bce2d717d76a3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DlgHost.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DlgHost.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc3.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc3.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRichEdit.dll
Resource
win7-20231215-en
General
-
Target
75127791692e1c0d611bce2d717d76a3.exe
-
Size
253KB
-
MD5
75127791692e1c0d611bce2d717d76a3
-
SHA1
aa352dbd08d2676acb7ec0789bc4a3a339bcb5ab
-
SHA256
34cbb22494b0e3dea0fa9eba3cdcaaaaa7e0739adbbf7cca4f788cc7ef0d2f82
-
SHA512
e15f0c4d26494101997b576fb84142721b748182b64035c228e407f97fcc597b485a6b5ebc7650c4f7bf6e37d1c62721b91bc9462efa719c980f1139b343a2a4
-
SSDEEP
6144:csk0zS3dVHKF5HH6rlIqY5RCgAirhvVFgByM:rzwd9K3n+lIqqRCQrhQ
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe 5000 75127791692e1c0d611bce2d717d76a3.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
16KB
MD5f642e8cfce23aa5d124533357de7394b
SHA180ce98a2bc4b416db357ea52a74424d742cfaa55
SHA256f1bed304ea1d96094c1e4e3f8e112b7ce15af4441192e73c9144f774ad132d2e
SHA512d0ec47e3a69cc6c6f54e8ba58cade7875ace43b66946e7bd4b678dc246c61acf8d36aeaf80082308f08783c28424c5db601bdde1d820f7797b60ca4fe948ad26
-
Filesize
17KB
MD57d3317f57c1a368480ace3c0ca804eeb
SHA1d4c7e185bc64aac82339f51ba6c21cf0713c9f1a
SHA256d88a04c1e39db583eaad727fd390fe599ab10198ee040bfbdd22daefadbd2372
SHA5125598c2e6caa2f66edd48f8c8305e054d4b0740b5f2b7ed92cf197a13ac66ba99a32013d34b3c2e28d007ab7979eb90a50681324eb736b1410e7df1902e4ec32a
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e