Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7KEY FRP TO...pi.dll
windows7-x64
3KEY FRP TO...pi.dll
windows10-2004-x64
3KEY FRP TO...pi.dll
windows7-x64
1KEY FRP TO...pi.dll
windows10-2004-x64
3KEY FRP TO....1.exe
windows7-x64
3KEY FRP TO....1.exe
windows10-2004-x64
3KEY FRP TO...db.exe
windows7-x64
1KEY FRP TO...db.exe
windows10-2004-x64
1KEY FRP TO...rp.bat
windows7-x64
1KEY FRP TO...rp.bat
windows10-2004-x64
1KEY FRP TO...rp.bin
debian-9-armhf
1Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 16:25
Behavioral task
behavioral1
Sample
KEY FRP TOOL V1.1/AdbWinApi.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
KEY FRP TOOL V1.1/AdbWinApi.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
KEY FRP TOOL V1.1/AdbWinUsbApi.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
KEY FRP TOOL V1.1/AdbWinUsbApi.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
KEY FRP TOOL V1.1/KEY FRP TOOL V1.1.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
KEY FRP TOOL V1.1/KEY FRP TOOL V1.1.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
KEY FRP TOOL V1.1/adb.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
KEY FRP TOOL V1.1/adb.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
KEY FRP TOOL V1.1/frp.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
KEY FRP TOOL V1.1/frp.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
KEY FRP TOOL V1.1/frp.bin
Resource
debian9-armhf-20240221-en
General
-
Target
KEY FRP TOOL V1.1/AdbWinApi.dll
-
Size
95KB
-
MD5
ed5a809dc0024d83cbab4fb9933d598d
-
SHA1
0bc5a82327f8641d9287101e4cc7041af20bad57
-
SHA256
d60103a5e99bc9888f786ee916f5d6e45493c3247972cb053833803de7e95cf9
-
SHA512
1fdb74ee5912fbdd2c0cba501e998349fecfbef5f4f743c7978c38996aa7e1f38e8ac750f2dc8f84b8094de3dd6fa3f983a29f290b3fa2cdbdaed691748baf17
-
SSDEEP
1536:Jwqdq+3pvspmLh8SCykrpTG7kfGHuNezq02XJqo+iFi1yCP:JwqD3L8Tezq0et+ui1y
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2244 1812 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1504 xpsrchvw.exe 1504 xpsrchvw.exe 1504 xpsrchvw.exe 1504 xpsrchvw.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1812 2992 rundll32.exe 28 PID 2992 wrote to memory of 1812 2992 rundll32.exe 28 PID 2992 wrote to memory of 1812 2992 rundll32.exe 28 PID 2992 wrote to memory of 1812 2992 rundll32.exe 28 PID 2992 wrote to memory of 1812 2992 rundll32.exe 28 PID 2992 wrote to memory of 1812 2992 rundll32.exe 28 PID 2992 wrote to memory of 1812 2992 rundll32.exe 28 PID 1812 wrote to memory of 2244 1812 rundll32.exe 29 PID 1812 wrote to memory of 2244 1812 rundll32.exe 29 PID 1812 wrote to memory of 2244 1812 rundll32.exe 29 PID 1812 wrote to memory of 2244 1812 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\KEY FRP TOOL V1.1\AdbWinApi.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\KEY FRP TOOL V1.1\AdbWinApi.dll",#12⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 2523⤵
- Program crash
PID:2244
-
-
-
C:\Windows\System32\xpsrchvw.exe"C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Desktop\CompareFind.easmx"1⤵
- Suspicious use of SetWindowsHookEx
PID:1504
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2564