Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ibackupbot_setup.exe
windows11-21h2-x64
7$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...LL.dll
windows11-21h2-x64
3$PLUGINSDI...nu.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3iBackupBot...32.exe
windows11-21h2-x64
1iBackupBot...64.exe
windows11-21h2-x64
1iBackupBot...st.exe
windows11-21h2-x64
7$PLUGINSDI...LL.dll
windows11-21h2-x64
3Analysis
-
max time kernel
89s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
ibackupbot_setup.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
iBackupBot for iPad iPhone/iBackupBot-32.exe
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
iBackupBot for iPad iPhone/iBackupBot-64.exe
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
iBackupBot for iPad iPhone/uninst.exe
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win11-20240412-en
General
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
ea60c7bd5edd6048601729bd31362c16
-
SHA1
6e6919d969eb61a141595014395b6c3f44139073
-
SHA256
4e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39
-
SHA512
f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993
-
SSDEEP
48:im1nEhqneMPUptuMMNvimk2BAZuMTRCpYEvJdUJvR0J6of5dwe:F1jpl9NLBAZuYtR0xd
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3180 4180 WerFault.exe 79 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 4180 4108 rundll32.exe 79 PID 4108 wrote to memory of 4180 4108 rundll32.exe 79 PID 4108 wrote to memory of 4180 4108 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#12⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 4483⤵
- Program crash
PID:3180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4180 -ip 41801⤵PID:4632