Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3MyTimeShut...14.exe
windows7-x64
7MyTimeShut...14.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Comdlg32.dll
windows7-x64
1Comdlg32.dll
windows10-2004-x64
1GetPc.dll
windows7-x64
1GetPc.dll
windows10-2004-x64
1MSCOMCT2.dll
windows7-x64
1MSCOMCT2.dll
windows10-2004-x64
1MyTimeShutDown.exe
windows7-x64
6MyTimeShutDown.exe
windows10-2004-x64
6mscomctl.dll
windows7-x64
1mscomctl.dll
windows10-2004-x64
1msvbvm60.dll
windows7-x64
1msvbvm60.dll
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3yfDNetMenu.dll
windows7-x64
1yfDNetMenu.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
MyTimeShutDown2013-1014.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MyTimeShutDown2013-1014.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Comdlg32.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Comdlg32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
GetPc.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
GetPc.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
MSCOMCT2.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
MSCOMCT2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
MyTimeShutDown.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MyTimeShutDown.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
mscomctl.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
mscomctl.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
msvbvm60.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
msvbvm60.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
yfDNetMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
yfDNetMenu.dll
Resource
win10v2004-20240412-en
General
-
Target
uninst.exe
-
Size
47KB
-
MD5
89da208242478eba8244dff59caa70dd
-
SHA1
f8fb2231a9d5418e0e7493fb79c97c6d5d903792
-
SHA256
40e7678e756ec9b60d054d60a97675300a0a762cae2a7b01a48a9f3828e4f753
-
SHA512
93f06c9e1214f00ab5fe59df022788f5642751f31fa2875a4853c35300f6b5457170df64fec1186fb335904c2ba1e7c80145775c87da8a29073455e91952c419
-
SSDEEP
768:PhMZ0dF4ZFvQbn+eePu3cIQGCGbiC4k42M3wJJVKBTAScjgUW:PyZMSZFvknTePMZd4k4kJJVercs3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2912 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 1348 uninst.exe 2912 Au_.exe 2912 Au_.exe 2912 Au_.exe 2912 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral17/files/0x000d000000015d59-2.dat nsis_installer_1 behavioral17/files/0x000d000000015d59-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2912 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2912 1348 uninst.exe 28 PID 1348 wrote to memory of 2912 1348 uninst.exe 28 PID 1348 wrote to memory of 2912 1348 uninst.exe 28 PID 1348 wrote to memory of 2912 1348 uninst.exe 28 PID 1348 wrote to memory of 2912 1348 uninst.exe 28 PID 1348 wrote to memory of 2912 1348 uninst.exe 28 PID 1348 wrote to memory of 2912 1348 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564B
MD534e8d84b19aa27dbfff32cda8829fa4e
SHA199702fb253fa5593a94393ca4923e61db381df72
SHA2569a062c51d63f44a7a15711af370957533906f9e6ddf2ac67a3d7fd15fa218f11
SHA5123e97a3fc916a6f3dc06a71851818d0315b7162807db4cb1b6fdb8b9290b7f90af87cac2c7569fd31466f9746dd2872d4f008e1a5fd4864d6464e07a83a7d9263
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
47KB
MD589da208242478eba8244dff59caa70dd
SHA1f8fb2231a9d5418e0e7493fb79c97c6d5d903792
SHA25640e7678e756ec9b60d054d60a97675300a0a762cae2a7b01a48a9f3828e4f753
SHA51293f06c9e1214f00ab5fe59df022788f5642751f31fa2875a4853c35300f6b5457170df64fec1186fb335904c2ba1e7c80145775c87da8a29073455e91952c419