Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3bb6d817b65...b5.exe
windows7-x64
7bb6d817b65...b5.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
bb6d817b65c8c3cf4bef0b9599fa06b5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb6d817b65c8c3cf4bef0b9599fa06b5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AllRemover.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AllRemover.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/WebBrowserNavigate.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/WebBrowserNavigate.dll
Resource
win10v2004-20240226-en
General
-
Target
bb6d817b65c8c3cf4bef0b9599fa06b5.exe
-
Size
191KB
-
MD5
bb6d817b65c8c3cf4bef0b9599fa06b5
-
SHA1
8877e7a71797e1b4d0aac5a76bcb862bcda5b8a3
-
SHA256
c22eabda16738769e7cc2d015b7e78f22a98117769a81b08f7ebefbdd3877dc2
-
SHA512
e2fc45044573ca60ad3380182f6606445f76aaedefcb1735198345c3bb07803542571f36763841aba6f12a44d81d025fca8ff991d98ce65e6adb4b808f0f8ae0
-
SSDEEP
3072:1j3DlADd0kJs+2RsDtJZgqbUT0sNzQa1GHsFpQ59miZTuP0HHKQV6Iymy6xGrVDy:1N7VatJZgJT0sNjbFpQ59m62aKgLylrQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 Au_.exe -
Loads dropped DLL 9 IoCs
pid Process 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 2604 Au_.exe 2604 Au_.exe 2604 Au_.exe 2604 Au_.exe 2604 Au_.exe 2604 Au_.exe 2604 Au_.exe 2604 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x00040000000130fc-2.dat nsis_installer_1 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2604 Au_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 Au_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2604 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 28 PID 1964 wrote to memory of 2604 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 28 PID 1964 wrote to memory of 2604 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 28 PID 1964 wrote to memory of 2604 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 28 PID 1964 wrote to memory of 2604 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 28 PID 1964 wrote to memory of 2604 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 28 PID 1964 wrote to memory of 2604 1964 bb6d817b65c8c3cf4bef0b9599fa06b5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb6d817b65c8c3cf4bef0b9599fa06b5.exe"C:\Users\Admin\AppData\Local\Temp\bb6d817b65c8c3cf4bef0b9599fa06b5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5c4c0c23f01fc5e2b407e2463e8f5080c
SHA17a55985593a6398d1a66883ae5f5929d4d9aee52
SHA256ff0f59a359c306b0cb0a8ed935e2e1208d3532607c32ab849cccb7a15f09dd3d
SHA512013232e5b14fae8aa83f1e2541370003911f8c827df8a4e419b0ba1f2c090033c97b2fb589e9e27935a45cda0ccf1a8f1076c3342e940b754845a2cec2a421de
-
Filesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
Filesize
14KB
MD5bc8b9990819748dd57ccf28b73df57fd
SHA13e4f4bef94dec5745e49bdedd9c8ee85621d507c
SHA256f7c310298a938c77b52094280b56da106d00a63705e2cc4b3eb2a730be01ade4
SHA512fbeed46e079ae36ae26b655b3bae0cecd89181c8919b4a3aa03d4b32e3a8e365be0ab8df7ffa6e08576e4b8d797edc88a619e21af1d0d7df822250e2ffd3e57b
-
Filesize
10KB
MD50c8ea8e6637bbf8408104e672d78ba45
SHA1c231c7acaf9abb7da93f28e1b71bed164d57103e
SHA256509a93177a7ae130bc3b6b5ec3236c7aa0811b8b86f8ab3442c65fdf8ff85b1f
SHA512ee763a3cdbbba3b28e6a903ac942c7228bd8e54b19de21d6187e481f2916d833d9b9800e5ac2998f4aa26274cdfb20a8bfdd10f00f2a15d37bcc529b617e1f28
-
Filesize
180KB
MD52e50f8f24ebbf06cfe2a48a997dfeb05
SHA1e019b61713e874f96fd608d47e57d3663f688c5a
SHA2564d51779da2b3ecd55a8af6b8178ca429bf95b41ca17ce50bb02b681f9ea6d51a
SHA51273b26668a8f1a2e81915748ceed195a5ded9839578f5c114bdbd216692f646a21344230ab694eb26bd644e1d9a780c71db5d2bba8f92d33389873a5ed87c9420
-
Filesize
191KB
MD5bb6d817b65c8c3cf4bef0b9599fa06b5
SHA18877e7a71797e1b4d0aac5a76bcb862bcda5b8a3
SHA256c22eabda16738769e7cc2d015b7e78f22a98117769a81b08f7ebefbdd3877dc2
SHA512e2fc45044573ca60ad3380182f6606445f76aaedefcb1735198345c3bb07803542571f36763841aba6f12a44d81d025fca8ff991d98ce65e6adb4b808f0f8ae0