Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3file.exe
windows7-x64
7file.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Zip.dll
windows7-x64
3$PLUGINSDIR/Zip.dll
windows10-2004-x64
3$R1.ps1
windows7-x64
1$R1.ps1
windows10-2004-x64
1SumatraPDF.exe
windows7-x64
1SumatraPDF.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Checker.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Checker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Zip.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Zip.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$R1.ps1
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$R1.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SumatraPDF.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
SumatraPDF.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20231215-en
General
-
Target
uninst.exe
-
Size
39KB
-
MD5
b462f3c38bc5b56e06976a94a7c36bc7
-
SHA1
0106bf912fa9a37bb975afb00fd4ebaf7dff13cd
-
SHA256
446c3dc2041bd1d0968e92ec21d538da95dd85c62535293fdca425b02587bbe5
-
SHA512
f33baef794d57eec26df2b173719c3dde0e8e1f9354d598662d1b86c1317b21fbff17b1ce373495f9bfe717d10b8dba1d486fee18bbb51b726e480300c606343
-
SSDEEP
768:0Gn4o4BL/akfpI1nu0LXGS8BPfeyWMZtuHvwbtOuIYdPciuc1sJ:T4hwgonu0fJytuPwbdNcir1sJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4340 Un.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 Un.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral16/files/0x000600000002322b-3.dat nsis_installer_1 behavioral16/files/0x000600000002322b-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4340 2124 uninst.exe 84 PID 2124 wrote to memory of 4340 2124 uninst.exe 84 PID 2124 wrote to memory of 4340 2124 uninst.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe"C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
PID:4340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5b462f3c38bc5b56e06976a94a7c36bc7
SHA10106bf912fa9a37bb975afb00fd4ebaf7dff13cd
SHA256446c3dc2041bd1d0968e92ec21d538da95dd85c62535293fdca425b02587bbe5
SHA512f33baef794d57eec26df2b173719c3dde0e8e1f9354d598662d1b86c1317b21fbff17b1ce373495f9bfe717d10b8dba1d486fee18bbb51b726e480300c606343