Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3NLBrute 1....en.zip
windows7-x64
1NLBrute 1....en.zip
windows10-2004-x64
1NLBrute 1....en.exe
windows7-x64
5NLBrute 1....en.exe
windows10-2004-x64
5NLBrute 1....64.exe
windows7-x64
5NLBrute 1....64.exe
windows10-2004-x64
5NLBrute 1....32.dll
windows7-x64
1NLBrute 1....32.dll
windows10-2004-x64
1masScan_1.6/Input.txt
windows7-x64
1masScan_1.6/Input.txt
windows10-2004-x64
5masScan_1....UI.exe
windows7-x64
1masScan_1....UI.exe
windows10-2004-x64
1masScan_1....et.dll
windows7-x64
1masScan_1....et.dll
windows10-2004-x64
1masScan_1...._3.exe
windows7-x64
7masScan_1...._3.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ns.ini
windows7-x64
1$PLUGINSDI...ns.ini
windows10-2004-x64
1$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...er.bmp
windows7-x64
3$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$SYSDIR/Packet.dll
windows7-x64
1$SYSDIR/Packet.dll
windows10-2004-x64
1$SYSDIR/pthreadVC.dll
windows7-x64
1$SYSDIR/pthreadVC.dll
windows10-2004-x64
1$SYSDIR/wpcap.dll
windows7-x64
1$SYSDIR/wpcap.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 09:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
NLBrute 1.2 x64 & VPN - KeyGen.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
NLBrute 1.2 x64 & VPN - KeyGen.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
NLBrute 1.2 x64 & VPN - KeyGen/NLBrute 1.2 x64 & VPN - KeyGen.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
NLBrute 1.2 x64 & VPN - KeyGen/NLBrute 1.2 x64 & VPN - KeyGen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
NLBrute 1.2 x64 & VPN - KeyGen/NLBrute 1.2 x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
NLBrute 1.2 x64 & VPN - KeyGen/NLBrute 1.2 x64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
NLBrute 1.2 x64 & VPN - KeyGen/libeay32.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
NLBrute 1.2 x64 & VPN - KeyGen/libeay32.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
masScan_1.6/Input.txt
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
masScan_1.6/Input.txt
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
masScan_1.6/Massscan_GUI.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
masScan_1.6/Massscan_GUI.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
masScan_1.6/Packet.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
masScan_1.6/Packet.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
masScan_1.6/WinPcap_4_1_3.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
masScan_1.6/WinPcap_4_1_3.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/bootOptions.ini
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/bootOptions.ini
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$SYSDIR/Packet.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
$SYSDIR/Packet.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
$SYSDIR/pthreadVC.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
$SYSDIR/pthreadVC.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
$SYSDIR/wpcap.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
$SYSDIR/wpcap.dll
Resource
win10v2004-20231215-en
General
-
Target
masScan_1.6/Packet.dll
-
Size
94KB
-
MD5
1250bef11bfa086f772cd2a273bc036e
-
SHA1
bfb60b4072f4533d8497f3d90631f818e345bcc6
-
SHA256
6b19cffaa2bf4359be1a0130a1fb47ab45e8c3be5d0cb7986579c5e04e1d77a5
-
SHA512
76cbc346468d400c4e6a95b3c91abfec0a63a375aade6f47c70a3b3db76c513bcfd91ed2994059a6c8bdd6b266f9b17ecf11f9941481c7a2692925d2457f5bba
-
SSDEEP
1536:6wG9plhvRIRVC2wJAyPFCnPKc0z70yIKtIn8zVpWj:E9rjh5t9cZyIKtInb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4908 3152 rundll32.exe 86 PID 3152 wrote to memory of 4908 3152 rundll32.exe 86 PID 3152 wrote to memory of 4908 3152 rundll32.exe 86
Processes
Network
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request190.178.17.96.in-addr.arpaIN PTRResponse190.178.17.96.in-addr.arpaIN PTRa96-17-178-190deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request189.178.17.96.in-addr.arpaIN PTRResponse189.178.17.96.in-addr.arpaIN PTRa96-17-178-189deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request187.178.17.96.in-addr.arpaIN PTRResponse187.178.17.96.in-addr.arpaIN PTRa96-17-178-187deploystaticakamaitechnologiescom
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
190.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
189.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
187.178.17.96.in-addr.arpa