Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3a31944ff5c...a1.exe
windows7-x64
7a31944ff5c...a1.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
1$TEMPLATES...cs.dll
windows7-x64
1$TEMPLATES...cs.dll
windows10-2004-x64
1KKJDock.exe
windows7-x64
3KKJDock.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
a31944ff5c7531ecddbf45ac0d864ea1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a31944ff5c7531ecddbf45ac0d864ea1.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$TEMPLATES/installstat.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
$TEMPLATES/statistics.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMPLATES/statistics.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
KKJDock.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
KKJDock.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20240221-en
General
-
Target
a31944ff5c7531ecddbf45ac0d864ea1.exe
-
Size
925KB
-
MD5
a31944ff5c7531ecddbf45ac0d864ea1
-
SHA1
6bf457bf7f64a3cf7773f45a29ec97b2b39560ed
-
SHA256
24d824fb3eacf87429dfc236d3c491dfaa13ed412c4aae09de1aea967f3191e7
-
SHA512
5e099ea7b9d03d5e2ccb75bb7af5d3c4e86b85b5b65b0c050e076d4f3796f72505c15ff2224aaca4bd2295276db3b0c1a80d8ce5f66670828b7b867de1df49ef
-
SSDEEP
24576:yL0zpn6rCMmbaD1VDd0vqdHsLS23i0iDHvJR7wGGg:bzppbMfdHwrkDHvJV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3200 installstat.exe -
Loads dropped DLL 4 IoCs
pid Process 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe 3200 installstat.exe 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File created C:\Users\Admin\Documents\backup\desktop.ini a31944ff5c7531ecddbf45ac0d864ea1.exe File opened for modification C:\Users\Admin\Documents\backup\desktop.ini a31944ff5c7531ecddbf45ac0d864ea1.exe File created C:\Users\Admin\Documents\backup\User Pinned\TaskBar\desktop.ini a31944ff5c7531ecddbf45ac0d864ea1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a31944ff5c7531ecddbf45ac0d864ea1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini a31944ff5c7531ecddbf45ac0d864ea1.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\SIGNUP\msn.1nk a31944ff5c7531ecddbf45ac0d864ea1.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\msn.1nk a31944ff5c7531ecddbf45ac0d864ea1.exe File created C:\Program Files\Internet Explorer\SIGNUP\in a31944ff5c7531ecddbf45ac0d864ea1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk a31944ff5c7531ecddbf45ac0d864ea1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ = "lnkfile" a31944ff5c7531ecddbf45ac0d864ea1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3200 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe 93 PID 2024 wrote to memory of 3200 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe 93 PID 2024 wrote to memory of 3200 2024 a31944ff5c7531ecddbf45ac0d864ea1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a31944ff5c7531ecddbf45ac0d864ea1.exe"C:\Users\Admin\AppData\Local\Temp\a31944ff5c7531ecddbf45ac0d864ea1.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
568B
MD57576562cc65c8ae0a4ea80d9981b8617
SHA1ac7c8a4c29aa57bf42d0ae171ef5def9c61a2548
SHA2569a14e89717936e94f25ec2b130e77032f408e61bd8930cdea02a1335c95c9c86
SHA51272215e910024438ca5d726215756fd9890f1a8860037be6855b9f30fb03f72397de11199f808f50b02e56f083392141a917d78458dd485c803eb34d6eeaddcf5
-
Filesize
2KB
MD558b9b2dbba945f94517a98db59c50ee2
SHA1859929c1ff74d95532a62869d5c9d2ba42d82994
SHA2563e10f365918e0c90b66d7f7fe52dd6ebd54b5bf659a6b758f4eaf50c1fbfcd56
SHA5125f795a3a8f37ef097043538cf66558ca275883b6c41866010978421ea2e276b82c7c1045399e95004a22f02c90476be91705cef855839e94bc694b5e9bed3d23
-
Filesize
2KB
MD59ad2da787291673bdf7f23ddb4584448
SHA17a3bf699ad882b079acd22c5ea4449de2f72e31c
SHA256104cb9e122bdee68201f2b1b66b7a95753f678bd2b44b88066b4127ee619f950
SHA512627a3fe8ce9374c7621b7df3ae8c2836f76e9db753e24651fb8647b3a9609f7c9fe3c504456e0446a00342fd794b5bcfde3a0d64f351e76c207664c561c041d9
-
Filesize
352B
MD5325b790bc93ad8d27655c44365b485c0
SHA150b633a4ca28210ca882467cbc0d717d3283ac75
SHA25678be9c61505cd98110a9b9ead83fac552d5b89fc549988fc9050cdaffb66f281
SHA512a110a939eaab63be4cf362f4755f46486d41abfb316dedba3eb553d06bbaaa67fd2db31069fc47e937229f7a5c741aafd6dafa3c5a2cdb0cc9a62e0c2400e7b8
-
Filesize
334B
MD5dd26c664f5264c672b6c4c260ed79c73
SHA1b118670620d7214224c7ed2dc14ee67d7a49c044
SHA256f8af405fb4819223f8f55c0ee3c054d58998af1560cededeaee35ea46a3497bd
SHA5127d4773e7b7a9bdeff00886b73e082c1fd74f349db88edaf5a2fc1fad312ef770a70ea6f620833302e3e53c82d539c7132001610b9b24c4540b2f829cafbbadb7
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
528KB
MD5d96eb3c463e3d79bde702cabb882d2e3
SHA1952c4a91492478d6e99dc18557f02873df400a69
SHA25659fa6395e5752ce5fa4d077b0174c05ffd53607b0dde03e041ff8c2a746c86b0
SHA512ebe922743a26dac2c8058a77dc7805006917fa2f95b83f257b2b3d734e1d346f7d3ad460fee02d39c2399dbe2ec26b4bd20f8ccf7858f0feeb8a43c6cc5d62df
-
Filesize
407B
MD5f727cbb9351106b2dd46f3ef649f3176
SHA15732055ec636a4706c6da6857ce1c1ebc1bc86e5
SHA256cf116b33831de9f80847abdb2a0d92ab3d3f956a8e209ec95d35d986eea8c7b5
SHA51201dffdcec62254701b9523bca7f572c1f5a5328a18c01fd6590721aded39d86db801bda23bb83b23876b67101991426a5c54087597971206276eeb18dd70f6bc
-
Filesize
1012B
MD531d7a70ec02f9232638861bfe0be4531
SHA1d89f9099dc4ce7926ad6c2d09af9865a4c564d44
SHA256dce389da9dbb0fef069fbf370fcb68c5a434f3b7fc2e6bf0f7657b3b591d4a55
SHA512ff7c2e085cd996367e9b242da761b1155759d568a3e577a18301a7fb5337fa3f2e32d4ab41f13263f5b8af35d8aa2a7d0c42ac450df73192d15bc8d77f181ef8
-
Filesize
2KB
MD54f5d3642ddb91e71915443c754f95993
SHA12e271aa9976244eab1a26e81b1f4cc0defa61223
SHA25674b29eec61b0d8df5c070880de034ea14d72e188b97d556ad95558224637e8bd
SHA512e6efa2e7c276bfcd11fd2f629de04802dc53820cdf5f5937ae085eb255b8c17d9f3f1b5deafca5b9f00b078e21d4ee3c5862cc87eb4e275e0e22396174c34c77
-
Filesize
83B
MD55739ddee167d55bbc4e313d778724a2b
SHA1c0bff8120f033ed78dcbb8729fc7a42f015e878e
SHA256384d63847d60b0612904dbde266eea1026c7c44efc8582a3ec18d2f49ca22805
SHA51285a84e5d900e6b58bb4c0ff77f33ff41c355932f3f2bf4d13b4dfd4e41c7a0671404731a5d4d3cc3fb15acf838516620f1d9c1f896f3e068279b8da00807b29f
-
Filesize
148B
MD5623a388da0f5a5c9892d3eabf1bbd52a
SHA11e2f6397843c518728affeb462127d70eab34e91
SHA2567ec3a3fb6a5f1cd628305053dfadc26fee7f378ea95d7fec212c5e42ae376066
SHA51283608a90ca9cced09547f21c6b420634713a88fc153d3eed6275e3d38c8d2feb739dbfbeba108a6d8414db7e6e8b081e8d716b2ef905f57f2871a82e2964d25f