Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
38f24ef1371...e7.exe
windows7-x64
18f24ef1371...e7.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3client/error.htm
windows7-x64
1client/error.htm
windows10-2004-x64
1client/index.html
windows7-x64
1client/index.html
windows10-2004-x64
1client/index1.html
windows7-x64
1client/index1.html
windows10-2004-x64
1client/index2.html
windows7-x64
1client/index2.html
windows10-2004-x64
1client/ok.htm
windows7-x64
1client/ok.htm
windows10-2004-x64
1client/view/list.exe
windows7-x64
1client/view/list.exe
windows10-2004-x64
1mpvod.exe
windows7-x64
7mpvod.exe
windows10-2004-x64
7readme.htm
windows7-x64
1readme.htm
windows10-2004-x64
1register.htm
windows7-x64
1register.htm
windows10-2004-x64
1repaire.exe
windows7-x64
1repaire.exe
windows10-2004-x64
1skinhelp.htm
windows7-x64
1skinhelp.htm
windows10-2004-x64
1vodclient.exe
windows7-x64
1vodclient.exe
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
8f24ef137125d87a055764dfcd3a1ae7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f24ef137125d87a055764dfcd3a1ae7.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
client/error.htm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
client/error.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
client/index.html
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
client/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
client/index1.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
client/index1.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
client/index2.html
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
client/index2.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
client/ok.htm
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
client/ok.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
client/view/list.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
client/view/list.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
mpvod.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
mpvod.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
readme.htm
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
readme.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
register.htm
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
register.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
repaire.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
repaire.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
skinhelp.htm
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
skinhelp.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
vodclient.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
vodclient.exe
Resource
win10v2004-20231215-en
General
-
Target
mpvod.exe
-
Size
715KB
-
MD5
e4ae853f940f772d11cdb231b8cf2b6b
-
SHA1
d7d1c028c2639329ea0762ea8df89ccbfb94b400
-
SHA256
938985ca32df0ec5ff1bbe23389a98bf98733e72fd7d70e5ba9ce3802669a759
-
SHA512
9dd3330c9ea4033de52771755edb69e6b7ee7d59a2b9ce8f2b2eaa294c41e42f9603e0f58a9893b2f95be5204d121bab9767c70cd5f5b07c342bf058849e5e18
-
SSDEEP
12288:xhveuM43b+/FyNLgnVr8qSFCF2iVVxPBIdqweL7uzrslvd3:vv3bZ14Vr8qUI+dre4rsl5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2228 VODServer.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 mpvod.exe 2980 mpvod.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MidiPlay.drv mpvod.exe File opened for modification C:\Windows\MidiPlay.drv mpvod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\ButtonText = "ÍøÖ·´óÈ«" mpvod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\Icon = "C:\\Windows\\system\\shell32.dll,167" mpvod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\Exec = "http://www.k369.com" mpvod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\HotIcon = "C:\\Windows\\system\\shell32.dll,167" mpvod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\MenuStatusBar = "ÍøÖ·´óÈ«" mpvod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\MenuText = "ÍøÖ·´óÈ«" mpvod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions mpvod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438} mpvod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\CLSID = "{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}" mpvod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{C18CB140-0BBB-11D4-8FE8-0088CC102438}\Default Visible = "Yes" mpvod.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2980 mpvod.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe 2980 mpvod.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2228 2980 mpvod.exe 28 PID 2980 wrote to memory of 2228 2980 mpvod.exe 28 PID 2980 wrote to memory of 2228 2980 mpvod.exe 28 PID 2980 wrote to memory of 2228 2980 mpvod.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\mpvod.exe"C:\Users\Admin\AppData\Local\Temp\mpvod.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\VODServer.exe"C:\Users\Admin\AppData\Local\Temp\VODServer.exe" 354942⤵
- Executes dropped EXE
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193B
MD523fd75b208777a28e7c4f5e755dc0441
SHA1a28535bbbe42e989a7f06c07033eb816dd0b3198
SHA25643fa10aa096caf5b61cfc7f7d53406ec844dadc27edbc71af5098dedb212d2b7
SHA512d4f106a2ce6da3fd045c01a8f4e22be4b6e718bebe82eaabafa929e7641e872e1d8c3a12923be4097208b014c7d942045a04092d1ed9b79a9b2f47a418098fc1
-
Filesize
6KB
MD589195f96e82b4228e237bd46bc41afa7
SHA189f6eec9d7f3c85ee242d2f7b22b02f2c3eb2c87
SHA256e553e5b776a2266274d0eb57319423b80d9210c997135b424998f4e229361038
SHA512352f2c02f690d5e7961beec1f4cece902b65e033962c2a6b0a0542617e51e2c427568388cceb2332a1cd38f545448a3c0e9cdde87fecdbb6d8360a539c8bc750
-
Filesize
107KB
MD59e8ba54312d4c2ff2d880bd640a7d32b
SHA1a34e1bf8a6cc649a80838b82c1d043eb59e44572
SHA2569ed7f6e1ddb86482d8fefd25c0b9153e43d46f9440bf9539a907e5e9743b544d
SHA512849065db2178d06f8a4caa8044da55ff3e5ca17c88a9eb4125cbdd08ad1af79b2a3d7c934c8ee84fcdcd7f48a24202c389ad0c4be795c51ef067ce3247922234