Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3file.exe
windows7-x64
7file.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Zip.dll
windows7-x64
3$PLUGINSDIR/Zip.dll
windows10-2004-x64
3$R1.ps1
windows7-x64
1$R1.ps1
windows10-2004-x64
1SumatraPDF.exe
windows7-x64
1SumatraPDF.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Checker.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Checker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Zip.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Zip.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$R1.ps1
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$R1.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SumatraPDF.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
SumatraPDF.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20231215-en
General
-
Target
uninst.exe
-
Size
39KB
-
MD5
b462f3c38bc5b56e06976a94a7c36bc7
-
SHA1
0106bf912fa9a37bb975afb00fd4ebaf7dff13cd
-
SHA256
446c3dc2041bd1d0968e92ec21d538da95dd85c62535293fdca425b02587bbe5
-
SHA512
f33baef794d57eec26df2b173719c3dde0e8e1f9354d598662d1b86c1317b21fbff17b1ce373495f9bfe717d10b8dba1d486fee18bbb51b726e480300c606343
-
SSDEEP
768:0Gn4o4BL/akfpI1nu0LXGS8BPfeyWMZtuHvwbtOuIYdPciuc1sJ:T4hwgonu0fJytuPwbdNcir1sJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 Un.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 Un.exe -
Loads dropped DLL 1 IoCs
pid Process 356 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral15/files/0x000d000000012353-2.dat nsis_installer_1 behavioral15/files/0x000d000000012353-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 356 wrote to memory of 3024 356 uninst.exe 28 PID 356 wrote to memory of 3024 356 uninst.exe 28 PID 356 wrote to memory of 3024 356 uninst.exe 28 PID 356 wrote to memory of 3024 356 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe"C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5b462f3c38bc5b56e06976a94a7c36bc7
SHA10106bf912fa9a37bb975afb00fd4ebaf7dff13cd
SHA256446c3dc2041bd1d0968e92ec21d538da95dd85c62535293fdca425b02587bbe5
SHA512f33baef794d57eec26df2b173719c3dde0e8e1f9354d598662d1b86c1317b21fbff17b1ce373495f9bfe717d10b8dba1d486fee18bbb51b726e480300c606343