Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ad8a080727...65.exe
windows7-x64
3ad8a080727...65.exe
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
7$PLUGINSDI...er.exe
windows10-2004-x64
7$0/Resourc...d.html
windows7-x64
1$0/Resourc...d.html
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...n.html
windows7-x64
1$PLUGINSDI...n.html
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PROGRAMFI...gs.exe
windows7-x64
1$PROGRAMFI...gs.exe
windows10-2004-x64
1$PROGRAMFI...ot.dll
windows7-x64
1$PROGRAMFI...ot.dll
windows10-2004-x64
1$PLUGINSDI...11.exe
windows7-x64
7$PLUGINSDI...11.exe
windows10-2004-x64
7$PLUGINSDI...up.dll
windows7-x64
3$PLUGINSDI...up.dll
windows10-2004-x64
3$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
ad8a08072748aaf7737ea958a8424865.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad8a08072748aaf7737ea958a8424865.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ALOT_Toolbar_joydesk_partner_Installer.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ALOT_Toolbar_joydesk_partner_Installer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/eula_en.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/eula_en.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/installhelper.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/installhelper.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/ShopToWin11.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/ShopToWin11.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/CABSetup.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/CABSetup.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/gplunger.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/gplunger.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/textreplace.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/textreplace.dll
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
15KB
-
MD5
6e663f1a0de94bc05d64d020da5d6f36
-
SHA1
c5abb0033776d6ab1f07e5b3568f7d64f90e5b04
-
SHA256
458b70e1745dc6e768d2338ccf3e6e86436488954ca3763472d8ffec4e7177e4
-
SHA512
2a037c39f3a08d4a80494227990f36c4fef2f73c4a6ad74dcc334317a1372234c25d08d8b80d79e126881a49fa4b3f2fffe3604c959d9ceceb47acc7192cc6a5
-
SSDEEP
192:VsIZHdT9uwYX94kYd2iCzHR+yK7imphLAykycpKPd5mj8ozxGUWumle:VsUHd9GN2d2iwl0impATIPdAj8Ov6
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 3044 2264 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2264 2904 rundll32.exe 2 PID 2904 wrote to memory of 2264 2904 rundll32.exe 2 PID 2904 wrote to memory of 2264 2904 rundll32.exe 2 PID 2904 wrote to memory of 2264 2904 rundll32.exe 2 PID 2904 wrote to memory of 2264 2904 rundll32.exe 2 PID 2904 wrote to memory of 2264 2904 rundll32.exe 2 PID 2904 wrote to memory of 2264 2904 rundll32.exe 2 PID 2264 wrote to memory of 3044 2264 rundll32.exe 1 PID 2264 wrote to memory of 3044 2264 rundll32.exe 1 PID 2264 wrote to memory of 3044 2264 rundll32.exe 1 PID 2264 wrote to memory of 3044 2264 rundll32.exe 1
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 2481⤵
- Program crash
PID:3044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2904